Project Gutenberg's Northwestnet NUSIRG Internet Guide, by Jonathan Kochmer This eBook is for the use of anyone anywhere at no cost and with almost no restrictions whatsoever. You may copy it, give it away or re-use it under the terms of the Project Gutenberg License included with this eBook or online at www.gutenberg.org ** This is a COPYRIGHTED Project Gutenberg eBook, Details Below ** ** Please follow the copyright guidelines in this file. ** Title: Northwestnet NUSIRG Internet Guide Author: Jonathan Kochmer Editor: Dr. Eric S. Hood Dan L. Jordt Posting Date: December 17, 2011 [EBook #40] Release Date: September, 1992 Language: English Character set encoding: ASCII *** START OF THIS PROJECT GUTENBERG EBOOK NORTHWESTNET NUSIRG INTERNET GUIDE *** NorthWestNet User Services Internet Resource Guide (NUSIRG) Third Edition March,1992 On-Line PostScript Version 1.0, March 24, 1992 Author: Jonathan Kochmer Executive Editor: Dr. Eric S. Hood Technical Editor: Dan L. Jordt Production Manager: Schele Gislason Copyright (c) 1991 by the NorthWestNet Academic Computing Consortium, Inc. A product of NorthWestNet and the Northwest Academic Computing Consortium, Inc. All rights reserved. NWACC permits the copying of NUSIRG or parts of NUSIRG for research and educational purposes only, provided that appropriate attribution is given to both NWACC and NorthWestNet. The requirement for appropriate attribution will be satisfied by the inclusion of this copyright page with every copy. Resale of NUSIRG is expressly prohibited without written permission from NWACC, Inc. NWACC, Inc. makes no warranty of any kind, expressed or implied, with regard to the contents of this Guide, nor shall be liable in any event for incidental or consequential damages, direct or indirect, resulting from the use of this document. NorthWestNet User Services Internet Resource Guide i TABLE OF CONTENTS How To Get NUSIRG ......................................................................................................................... i About NorthWestNet........................................................................................................................... iii NorthWestNet Acceptable Use Policy ................................................................................................. v NSFNET Backbone Services Acceptable Use Policy........................................................................... vi NorthWestNet Network Operations Center (NOC) .............................................................................. vii Acknowledgements ............................................................................................................................. ix SECTION 1: NUSIRG, THE INTERNET, AND YOU ........................................................................ 1 Chapter 1: Overview of the NorthWestNet User Services Internet Resource Guide (NUSIRG) ............................................................................................................................. 2 Chapter 2: The Internet.......................................................................................................... 6 SECTION 2: THE BASIC TOOLS...................................................................................................... 18 Chapter 3: Electronic Mail..................................................................................................... 20 Chapter 4: Using FTP ............................................................................................................ 39 Chapter 5: TELNET .............................................................................................................. 53 Chapter 6: "Archie": The FTP Archive Guru.......................................................................... 65 SECTION 3: COMMUNICATING WITH PEOPLE............................................................................ 70 Chapter 7: Using USENET .................................................................................................... 71 Chapter 8: LISTSERV Discussion Lists................................................................................. 87 SECTION 4: KNOWLEDGE AT YOUR FINGERTIPS...................................................................... 94 Chapter 9: Electronic Journals ............................................................................................... 96 Chapter 10: Electronic Books ................................................................................................ 98 Chapter 11: Accessing Library Catalogs Through The Internet .............................................. 103 Chapter 12: Internet Accessible Databases and Bibliographies............................................... 119 Chapter 13: WAIS ( Wide Area Information Server ) : An Interface to Databases.................. 148 Chapter 14: Internet Directory Services ................................................................................. 159 SECTION 5: EXPLORING NEW FRONTIERS.................................................................................. 170 Chapter 15 : Using the Global Internet in K-12 Education ..................................................... 171 SECTION 6: EMPOWERING SCIENTIFIC RESEARCH .................................................................. 216 Chapter 16: Using Supercomputers on the Internet ................................................................ 217 Chapter 17: Supercomputer Site Descriptions ........................................................................ 230 Trademarks and Copyrights................................................................................................................. 264 How Did We Do?................................................................................................................................ 266 INDEX................................................................................................................................................ 270 Introduction NorthWestNet User Services Internet Resource Guide i How To Get NUSIRG THE NORTHWESTNET USER SERVICES INTERNET RESOURCE GUIDE You can either get NUSIRG at no charge by the Internet "File Transfer Protocol" (FTP), or you can purchase a bound copy from NorthWestNet. If you have a connection to the Internet, you are encouraged to follow these instructions for using FTP to obtain NUSIRG. If you can't use FTP (or don't know how yet!), instructions on how to order a printed and bound copy from NorthWestNet are included on the next page. Free Copies of NUSIRG By File Transfer Protocol (FTP) NUSIRG is available at no charge, by FTP, as text-only or PostScript files. The text-only files are in a simple format which can be printed by most kinds of printers or viewed on-screen with most text editors. The PostScript files produce output which is essentially identical to the bound version of NUSIRG. If you have access to a computer connected to the Internet, all you have to do is follow the simple instructions below. Note: commands you type are shown in the left hand column in lower case (don't type the #'s!); UPPER CASE and ">" indicates prompts from the computer that will appear on your screen. What you type (or what you'll see) Explanation 1) ftp ftphost.nwnet.net Connect to the NorthWestNet FTP host. 2) LOGIN: anonymous At the "LOGIN:" prompt enter "anonymous". 3) PASSWORD: your-user-id@address At the "PASSWORD:" prompt, please enter your [email protected] (e.g., [email protected]). 4) FTP> cd nic/nwnet/user-guide Change directories (cd) to the directory containing FTP copies of NUSIRG. 5) FTP> get README.nusirg Use the "get" command followed by a filename from the list on the next page to copy a file; get "README.nusirg" first, which contains the most upto-date information about NUSIRG files. 6) FTP> ls The "ls" command will produce a listing of the names of the files in the NUSIRG directory (see below). 7) FTP> quit The "quit" command will end your FTP session. The file "README.nusirg" contains more detailed information about the files in the NUSIRG directory. Introduction NorthWestNet User Services Internet Resource Guide Files in the NUSIRG directory README.nusirg nusirg.beginner.overview.ps nusirg.beginner.overview.txt nusirg.email.ftp.telnet.ps nusirg.email.ftp.telnet.txt nusirg.listserv.usenet.ps nusirg.listserv.usenet.txt nusirg.online.info.resources.ps nusirg.online.info.resources.txt nusirg.supercomputers.ps nusirg.supercomputers.txt nusirg.teach.k-12.ps nusirg.teach.k-12.txt nusirg.whole-guide.ps.tar.Z nusirg.whole-guide.txt.tar.Z ii Description of file's contents A detailed description of NUSIRG files. Overview of NUSIRG and the Internet. Basic Internet tools: e-mail, FTP, TELNET. Using USENET and LISTSERV. Electronic books, libraries, databases, etc. Supercomputer use and access information. The Internet and K-12 education. All of NUSIRG in compressed and archived format. Notice that the file names above occur in pairs differing only in the last parts of their names. Files ending with "ps" are in PostScript format and cannot be printed unless you have access to a PostScript printer. You should not copy the files whose names end with "tar.Z" unless you know how to handle compressed and archived files, which is explained in the file "README.nusirg". Printed Copies From NorthWestNet If you would prefer to purchase an already printed and bound copy (or if you are unable to use FTP), NUSIRG is available for $20.00 per copy from NorthWestNet. postal mail: NorthWestNet NUSIRG Orders 15400 SE 30th Place, Suite 202 Bellevue, WA 98007 e-mail: phone: fax: [email protected] (206) 562-3000 (206) 562-4822 Please make your check or money order payable to NorthWestNet. If you have questions, comments, or suggestions about NUSIRG, please send e-mail to [email protected] Introduction NorthWestNet User Services Internet Resource Guide iii About NorthWestNet NorthWestNet is a regional computing and digital communications network founded in 1987 by the Directors of the Northwest Academic Computing Consortium, Inc. (NWACC). The NWACC mission is to promote research, education and economic development by providing access to network communications, computing and electronic information systems and services throughout the Northwest. In 1988 NWACC was incorporated in the state of Oregon as a not-for-profit corporation. NorthWestNet is wholly owned, operated and managed by NWACC. NorthWestNet is an independent, regional sub-unit of the Interim National Research and Education Network (NREN) currently managed and operated by the National Science Foundation (NSF). A national movement is growing to build a permanent National Research and Education Network (NREN) to enhance the nation's and each state's educational, research, and economic competitiveness and productivity. NREN is designed to provide the primary information linkage among the nation's knowledge-based organizations including higher education institutions, scientific laboratories, and industrial research units. The general architecture of NREN has three levels: a federally-sponsored interstate foundation (backbone) network; midlevel networks providing broad, regional connectivity and expected to be partially self-supporting; and self-sponsored individual campus, government agency, industrial and federal laboratory networks distributing information to their end users. NorthWestNet is a regional (midlevel) network which is cooperatively addressing the high-performance computing and networking needs of the Northwest within the scope of the NREN policies. NorthWestNet serves higher education institutions, government agencies, not-for-profit organizations and industry in six states (Alaska, Idaho, Montana, North Dakota, Oregon and Washington). Since NorthWestNet was established in 1987, our network connectivity has expanded from 11 originator members to over 60 sites. Similar growth is expected over the next five years as NorthWestNet expands and enhances network services offerings and marketing efforts. NorthWestNet is financially supported by a grant from the National Science Foundation (NSF), institutional membership dues and network service fees. In April 1991 the NSF confirmed renewal of NorthWestNet's core grant, first approved in 1988. Under the terms of the grant renewal, NSF has committed funds totaling nearly two million dollars distributed over the next three-year contract period. NWACC revenues and annual operating budgets for the next three fiscal years are expected to exceed one million dollars annually. In 1989 NWACC initiated a strategic planning process to chart the future course for NWACC and NorthWestNet. The resultant plan recognizes the special needs of the northwestern United States, a geographically large, yet sparsely populated area. Current markets for NorthWestNet services are rapidly expanding and broadening, extending past the conventional education and research communities to industry, government agencies and health care organizations. Technical and operational implementation of the NorthWestNet Strategic Plan are now in progress. NorthWestNet is already upgrading network equipment, operations, and user services offerings. The NorthWestNet Network Operations Center (NOC) facilities management agreement with the University of Washington was formalized in June 1991. NorthWestNet currently offers a variety of information and user support services. For the past three years, NorthWestNet has published for its membership an Internet Users Training Manual. This new "NorthWestNet User Services Internet Resource Guide" (NUSIRG) is another step in our user services support. NUSIRG is available in both hardcopy and electronic formats to anyone using the Internet. Technical seminars and training courses are presented each autumn at our NorthWestNet Annual Meeting. Seminars and workshops on a variety of topics are presented by regionally and nationally recognized network engineers, communications technicians and user services specialists. A special training track for new NorthWestNet member institutions will also be offered beginning October 1991. Introduction NorthWestNet User Services Internet Resource Guide iv Workshops for researchers and scholars providing training in the use of high-performance computing systems and networked information resources are offered periodically and are also held in conjunction with our Annual Meeting. To facilitate communication among participants in our numerous committees and working groups, NorthWestNet operates and maintains electronic mail exploders for the NWACC Board of Directors and Executive Committee, the NorthWestNet Technical Committee and Configuration Subcommittee, the User Services Committee and the Editorial Review Board. NorthWestNet maintains and offers via anonymous FTP a modest collection of regional and national networking policies, working papers and operational documents on our network information server. We are also vigorously pursuing the development of new programs focusing on high performance computing and parallel processing, electronic library resources and networked information services, K-12 educational networking, and health care information and delivery systems. Over the next five years, NorthWestNet is committed to servicing the needs of its expanding membership by: ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ Providing its members from education, government, not-for-profits and industry with the ability to access and to share advanced computing and information systems (especially data bases and electronic library resources) using high-speed telecommunications facilities; Seeking, promoting, and supporting methods and tools for assisting users to access and to share information in an interactive, convenient, integrated and easy-to-learn manner; Expanding NREN access to K-12 schools and education districts, health care organizations and economic development groups; Encouraging and enhancing education, research, and development by providing value-added network services in support of northwestern interests; Promoting affordable and, if possible, subsidized national, and international electronic access for all regional education and research organizations; Encouraging and facilitating collaboration among educational institutions, government, not-for-profit agencies and industry. Opportunities include (1) sharing computing and information resources, (2) sharing procurement and (3) transferring technology; Being a leader, both regionally and nationally, in the efforts to establish a regional electronic sharing of resources; and Being recognized by its membership and funding agencies as a provider of excellent quality services and support. The NWACC Executive Director, on board since June 1991, has established a home office for the NorthWestNet staff in the principal market city of Seattle. The Executive Director provides leadership and manages the network under the general direction of the Executive Committee and the Board of Directors. The Executive Director's staff coordinates network operations, technical planning and management activities, network information service delivery, network user training and educational services, and marketing and general network administration. The futures of NWACC and NorthWestNet are truly bright. In the Northwest's rapidly growing, technology-based and -driven economy, the demand for computing, electronic communications, and information services is ever increasing. With our expanded and enhanced network and computing service offerings, NorthWestNet membership and revenues are both projected to continue increasing rapidly through the mid-1990s. Dr. Eric S. Hood NWACC Executive Director September 1991 Introduction NorthWestNet User Services Internet Resource Guide v NorthWestNet Acceptable Use Policy NorthWestNet is a regional data communications network serving a consortium of universities and research groups in the northwestern United States. Its goals are summarized in the Articles of Incorporation for the Northwest Academic Computing Consortium, Inc.. All use of NorthWestNet facilities must be consistent with the goals and purposes of NorthWestNet. The intent of this statement is to describe certain uses which are consistent with the purposes of NorthWestNet, not to exhaustively enumerate all such possible uses. Some acceptable uses of NorthWestNet facilities include: ❏ ❏ ❏ ❏ ❏ ❏ Use for scientific research or instruction at member and associate member institutions through the provision of high-speed data communications; Use as a vehicle for scholarly communications; Use as a means for NorthWestNet members to access remote computing resources for the purpose of scientific research or instruction. Notable examples of such resources are the NSF supercomputing facilities; Use necessary to support other acceptable uses. For example, administrative communications which are part of the support infrastructure needed for research and instruction are acceptable. Similarly, communications directly between non-member institutions in support of research or instruction at member institutions is acceptable; Use required by agreements with NSF, the primary funding agency for NorthWestNet; Use by member institutions as a laboratory for research and experimentation in computer communications, where such use does not interfere with production usage. However, any experimental use requiring modification to router software or protocol layers below ISO layer 4 requires prior review by the Technical Committee. In general, commercial and general administrative use are prohibited. Use for scientific research or instruction at non-member institutions and at for-profit institutions may or may not be consistent with the purposes of NorthWestNet, and will be reviewed on a case by case basis. Use of NorthWestNet for any illegal purpose, or to achieve unauthorized access to systems, software, or data is prohibited. NorthWestNet is a production communications network on which many researchers depend. Uses that significantly interfere with the ability of other users to make effective use of the network are not acceptable. Version 2.0 May 12, 1988 Introduction NorthWestNet User Services Internet Resource Guide vi NSFNET Backbone Services Acceptable Use Policy GENERAL PRINCIPLE: (1) NSFNET Backbone services are provided to support open research and education in and among US research and instructional institutions, plus research arms of for-profit firms when engaged in open scholarly communication and research. Use for other purposes is not acceptable. SPECIFICALLY ACCEPTABLE USES: (2) Communication with foreign researchers and education in connection with research or instruction, as long as any network that the foreign user employs for such communication provides reciprocal access to US researchers and educators. (3) Communication and exchange for professional development, to maintain currency, or to debate issues in a field or subfield of knowledge. (4) Use for disciplinary-society, university-association, government-advisory, or standards activities related to the user's research and instructional activities. (5) Use in applying for or administering grants or contracts for research or instruction, but not for other fundraising or public relations activities. (6) Any other administrative communications or activities in direct support of research and instruction. (7) Announcements of new products or services for use in research or instruction, but not advertising of any kind. (8) Any traffic originating from a network of another member agency of the Federal Networking Council if the traffic meets the acceptable use policy of that agency. (9) Communication incidental to otherwise acceptable use, except for illegal or specifically unacceptable use. UNACCEPTABLE USES: (10) Use for for-profit activities (consulting for pay, sales or administration of campus stores, sale of tickets to sports events, and so on), or use by for-profit institutions unless covered by the General Principle or as a specifically acceptable use. (11) Extensive use for private or personal business. This statement applies to use of the NSFNET Backbone only. NSF expects that connecting networks will formulate their own use policies. The NSF Division of Networking and Communications Research and Infrastructure will resolve any questions about this Policy or its interpretation. Introduction NorthWestNet User Services Internet Resource Guide vii NorthWestNet Network Operations Center (NOC) Much recent national attention has focused on improving the quality of Internet connectivity services by enhancing "end-to-end" network management. In the three tiered hierarchy of the Internet, high priority has been placed upon the critical role of the midlevel networks in delivering quality connectivity services. "Hardening the regionals" has emerged as the phrase most often used to describe the portion of this new national initiative. Given the recent consensus regarding the importance of "end-to-end" network connectivity focused on mid-level networks, this brief summary of NorthWestNet's Network Operations Center (NOC) has been included in this Guide. INTRODUCTION The purpose of this document is to identify the functions that the Network Operations Center (NOC) will provide to maintain the operational integrity of the network. This document is available via anonymous ftp on ftphost.nwnet.net in local/nwnet/doc/uw-nwnet.noc. NETWORK MONITORING, REPAIR, AND TROUBLE TRACKING The NOC will provide real-time network monitoring and repair at the layers one (1) through four (4) in the OSI model. The link state of each NorthWestNet circuit will be queried periodically (approximately once a minute) by a Network Management Station (NMS). The NMS will be monitored 24 hours a day, 7 days a week. This NMS is expected to provide a real-time view of the entire network, and to have some rudimentary network diagnosis tools available to operators to identify common or general problems with link layer connectivity. The level of staffing is expected to vary between primary shifts (approximately 8:00 a.m. to 6:00 p.m. Monday through Friday), and the secondary shifts (the complement of the primary shift hours). The primary shift will have skilled network analysts available and trained in more complex network diagnostic tools. These analysts will be able to assist in problem diagnosis and resolution at the Network and Transport Layers. The secondary shift operators will be expected to recognize simple circuit outages (at the Physical and Link Layers), and initiate work orders with telecommunications providers. Once an outage or problem is identified, it will be tracked with a trouble ticket system to help provide consistency across multiple shifts and to identify reoccurring problems. CIRCUIT COMMISSIONING AND EQUIPMENT INSTALLATION The NorthWestNet NOC will configure the equipment necessary to facilitate member connections to the network and deliver it to the member site. If the technical representative of the member institution requires additional support to complete the installation, the NOC will endeavor to assist. The NOC will also assist the public telecommunications providers in specifying and commissioning the required data circuits. EQUIPMENT MAINTENANCE AND UPGRADE The NOC will reconfigure and coordinate upgrades of the NorthWestNet managed equipment as necessary. In case of a hardware failure, the NOC will ship a spare to the member institution's technical representative, not later than the next business day following discovery of the problem. Introduction NorthWestNet User Services Internet Resource Guide viii DIAGNOSTIC TOOLS REPOSITORY The NMS will act as a repository for network management tools. Tools in the public domain, developed locally by programming staff or available to the NOC through licensing agreements, will be stored on and available from the NMS. NMS DATA COLLECTION AND ANALYSIS The NMS periodically (approximately every 15 minutes) will query each router to retrieve a set of Management Information Base (MIB) variables that can be considered useful for diagnosis and analysis. This data will be stored on the NMS and made available for report generation or post-processing analysis. Rudimentary programs will be available to query this database and generate graphs as aids to problem diagnosis and reporting. Simple monthly reports on outages and circuit usage will also be derivable from this data. INVENTORY AND REVISION CONTROL The NOC will keep a database of NorthWestNet owned equipment, including serial numbers, revision levels, component types, equipment locations, etc.. DOMAIN NAME SERVICE Upon the request of a member, the NOC will provide interim primary or continuing secondary Domain Name Service. Members may request interim primary DNS from the NOC, which implies that all host name additions, changes, or deletions be done by NOC staff. When a member site is able to provide its own primary DNS, the NOC will, if requested, continue to provide secondary DNS. AGENCY INTERACTION The NOC will interact with national, regional, and member network agencies, as well as telecommunications providers and equipment vendors to facilitate transitions in network topology, resolve outages, or provide other operational assistance as required. SUPPORT FOR HUB SITES The NOC will assist technical staff at NorthWestNet hub sites in resolving connectivity problems. This assistance will be mainly in the form of consulting by phone and e-mail. NETWORK ENGINEERING With consultation from and review by the NorthWestNet Technical Committee, the NOC will provide network engineering services to define and implement a network topology and architecture that will achieve NorthWestNet's connectivity and cost objectives as set forth by the NorthWestNet Management Committee. Version 2.1, June 1991 Introduction NorthWestNet User Services Internet Resource Guide ix Acknowledgements It is perhaps appropriate that a book which is meant to demonstrate the extraordinary wealth of resources available on the Internet was written using the Internet itself as the main source of information. Only a very small set of printed books were consulted during the preparation of this document. Therefore, primary thanks go to the Internet itself, for being such a treasure trove of information! Snippets of information were collected from tens of thousands of postings in many discussion groups, including USENET, LISTSERVers, and Internet Interest groups. I thank everyone who so willingly shares their knowledge in these forums. Reading typical questions from new Internet users posted in these forums was also invaluable for helping to determine what should be included in an entry-level Internet guide. Another useful source of information was existing, online Internet documentation written by Internet user services staff around the world, and a large number of helpful documents about the Internet written by individuals on their own initiative, and shared on the Internet. I am very thankful to Larry Gales of the University of Washington, who wrote the chapter on Supercomputer Access, and to user services staff at the supercomputer sites for providing up-to-date descriptions of their state-ofthe-art sites. Very useful support, reviews, corrections and suggestions were provided throughout this project by the NUSIRG Editorial Review Committee: Dorette Dusterhoff, Eric Hood, Janaka Jayawardena, Dan Jordt, Dick Markwood, Paul Mauvais, Danny Raphael and Sandy Sprafka. Special thanks go to Danny Raphael (Director of User Services, University Computing Services, University of Washington), who loaned me a Macintosh computer and a modem for the duration of this project. Most research and writing was done from my home, which became an "electronic cottage" in the global village by virtue of a simple modem connection to the Internet. This Users Guide is proof that anyone in the world can access the wealth of Internet resources from their own homes with minimal hardware and software requirements. NUSIRG was written in three very hectic and obsessive months, July through September, 1991. I'd like to thank my friends and family for their support and understanding while I was transformed into a "virtual knowbot in cyberspace." Jonathan Kochmer The Cottage Seattle, Washington October 6, 1991 Introduction NorthWestNet User Services Internet Resource Guide 1 SECTION 1: NUSIRG, THE INTERNET, AND YOU Chapter 1: Overview of the NorthWestNet User Services Internet Resource Guide (NUSIRG) ............................................................................................................................. 2 Introduction ............................................................................................................. 2 What is The Internet?............................................................................................... 3 How To Use NUSIRG.............................................................................................. 4 Master Electronic Mail, FTP and TELNET; From There On, Explore!..................... 4 Communicate With NorthWestNet User Services..................................................... 5 Chapter 2: The Internet.......................................................................................................... 6 General Introduction ................................................................................................ 6 Overview of the Internet .......................................................................................... 7 Non-Internet Networks............................................................................................. 12 For More Information About The Internet ................................................................ 13 Section 1: NUSIRG, the Internet, and You NorthWestNet User Services Internet Resource Guide 2 Chapter 1: Overview of the NorthWestNet User Services Internet Resource Guide (NUSIRG) When people ask for education they normally mean something more than mere training, something more than mere knowledge of facts, something more than a mere diversion. Maybe they cannot themselves formulate precisely what they are looking for; but I think what they are really looking for is ideas that would make the world, and their own lives, intelligible to them. When a thing is intelligible, you have a sense of participation... E. F. Schumaker Small Is Beautiful (pg. 84) Once you get started, you'll start to understand... Overheard in a crowd INTRODUCTION Most of us use complex technologies like automobiles, televisions, or telephones every day, without knowing exactly how they work. We take it for granted that when we turn on a radio we'll hear news or music, and that when we start a car we'll get to where we want to go. Until very recently, using computer networks was like using a car in the beginning of the 20th century. Charlie Chaplin and Buster Keaton made comedies featuring wrestling matches with temperamental cars. It was funny because everybody knew you couldn't drive to the next town without getting greasy up to your elbows at least once. The technology was still being perfected, and sometimes it was hard to get where you were going. It was also hard to figure out how to find the places you were looking for. There's an old joke in New England about a city slicker asking for directions from a farmer sitting on his front porch. The farmer says, "You can't get there from here." As a person who grew up in the country, I've always thought this was short for saying, "well, I could give you directions, but unless you grew up in these parts, you probably won't understand anyway...." But things have changed with automobiles, and they're beginning to change with computer networks. Computer networks have jumped the first hurdle on the path which all technologies must run. They are now usually very reliable. Most of the time, you can press a few buttons and know that your message will be received by someone thousands of miles away, in a few seconds. Today, global computer networks are being used daily by millions of people who don't know much more about computers than the average person knows about the inner workings of a television set. Chapter 1: Overview of the NorthWestNet User Services Internet Resource Guide NorthWestNet User Services Internet Resource Guide 3 The purpose of NUSIRG is to help network users get over the second great hurdle of new technologies: Now that computer networks are reliable, what can they be used for? And once you know what can be done, you'll learn "how to get there from here." You can think of NUSIRG as a set of basic driving lessons, and a glove compartment full of "road maps" to the many interconnected routes and valuable services that together comprise a worldwide computer network known as "The Internet" (See Chapter 2: The Internet). WHAT IS THE INTERNET? The Internet is a world-wide network of networks which is able to inter-connect computers ranging from the simplest PCs to the most sophisticated mainframes. Internet users can use the Internet for an extraordinary range of purposes - long distance collaborations, freely copying programs and documents to and from remote computers, accessing library catalogs, logging in to supercomputers - the list of current Internet activities is large and the range of possible future applications is as unlimited as our imagination. The Internet is huge. As of June, 1991, it was estimated that the Internet is comprised of more than 5,000 networks connecting more than 350,000 computers. In fact, because it is in direct communication with satellites far above us, the Internet is already bigger than the earth. The Internet is used by a large and diverse community of people. An estimated 3,500,000 people from many of the world's nations use the Internet, and this number is continuing to grow exponentially. The Internet is also incredibly complex. There probably isn't a single person who understands everything about it. Remember this whenever you get confused, and you'll probably feel better! But once you've mastered a few basic skills, the Internet is easy to use. Already, there are thousands of elementary school students in the world engaging in global communication through the Internet, and millions of other people from all walks of life who count on the Internet as an integral part of their day-to-day educational and research activities. Chapter 1: Overview of the NorthWestNet User Services Internet Resource Guide NorthWestNet User Services Internet Resource Guide 4 HOW TO USE NUSIRG ...a book is more than a verbal structure, or a series of verbal structures; a book is the dialogue with the reader, and the peculiar accent he gives to its voice, and the changing and durable images it leaves in his memory. That dialogue is infinite. Jorge Luis Borges "For Bertrand Russell" Use NUSIRG Either As A Book Or As Individual Documents NUSIRG has been written so that it can be used either as a unified book, or as stand-alone chapters to teach you about specific Internet resources. Regardless of which way you use NUSIRG, each chapter will give you an indication of which other chapters of NUSIRG or other sources of Internet documentation will provide necessary background, or more detailed treatment of the topic at hand. Customize Your Copy Of NUSIRG! This document will be most effective if it is a continuing dialogue, between you, the Internet, and NorthWestNet User services. NUSIRG is meant to be a document that you can easily customize to your particular level of expertise and sets of interests. It is hoped that everyone who uses this guide will get some of the many documents referenced at the end of every chapter, and put them in the appropriate locations in their own particular version of NUSIRG. This document will have succeeded in one of it's primary goals if there are as many versions of NUSIRG as there are NUSIRG users, just like everybody's glove compartment contains a different collection of road maps. Most of the documents referenced can be obtained, for free, through a computer connected to the Internet. Getting free information is one of the easiest and most important networks skills you will learn. NUSIRG has been written for anyone who uses the Internet: from kindergarten teachers at small and isolated rural schools, to the most sophisticated supercomputer users at major urban research institutions. Throughout, every attempt has been made to keep the text simple without being simplistic, and thorough without being thoroughly overwhelming. MASTER ELECTRONIC MAIL, FTP AND TELNET; FROM THERE ON, EXPLORE! Every Internet user is different, but nonetheless most network activities are based on three basic skills: using electronic mail, copying files from remote computers (FTP), and logging in to remote computers (TELNET). It is also a good idea to get an overview of the Internet as a whole. You should read through the chapters on the Internet, electronic mail, FTP, and TELNET first, unless this material is already old hat to you. Although the remainder of NUSIRG is designed in a somewhat incremental fashion, you should be able to bounce around between chapters without too much difficulty once you've mastered the basic "Internet-working" skills. Most chapters have the following structure (where "x" is the topic of the chapter): Chapter 1: Overview of the NorthWestNet User Services Internet Resource Guide NorthWestNet User Services Internet Resource Guide 5 "What is x ?" "What is x used for?" "What do I need to know before I start using 'x'" A general overview of x A short example using x A longer example using x with step-by-step explanations "For more information on x...." Because the Internet is able to support a tremendous diversity of hardware and software, it is sometimes impossible to present an example which is guaranteed to work for everyone. In such cases, a "generic example" is presented to illustrate the essential features of a particular Internet topic. When necessary, you should obtain appropriate documentation from your instructor or user services staff on how a particular application is used at your site. By the winter of 1991, you'll be able to access a collection of such documentation in the computer archives of the NorthWestNet Network Information Center, but this service is not yet available. COMMUNICATE WITH NORTHWESTNET USER SERVICES If you are a computer instructor or user services staff member, feel free to duplicate and distribute any or all parts of NUSIRG, for your students or clients, provided that appropriate attribution is given to both NWACC and NorthWestNet. The requirement for appropriate attribution will be satisfied by the inclusion of the inside cover/copyright page with every copy. If you make significant changes to the documents, indicate that your document is a modified version of NUSIRG. And, if you feel the changes you make result in notable improvements of the document, please send us a copy so the next edition of NUSIRG can be even better! All comments and suggestions from anyone using NUSIRG will be gladly taken, and, when possible, will be used to improve the next editions. At the end of the guide there is a "User's Feedback Form" which you are encouraged to fill out and return to NorthWestNet user services. Welcome to the Internet - you are now a participating member of a global village! Chapter 1: Overview of the NorthWestNet User Services Internet Resource Guide NorthWestNet User Services Internet Resource Guide 6 Chapter 2: The Internet Is it a fact ... that by means of electricity, the world of matter has become a great nerve, vibrating thousands of miles in a breathless point of time? Rather, the round globe is a vast head, a brain, an instinct with intelligence! Or, shall we say, it is itself a thought, nothing but thought, and no longer the substance which we deemed it! Nathaniel Hawthorne, 1851 GENERAL INTRODUCTION The Internet is a world-wide computer network which allows you to communicate with millions of other Internet users and to use the resources of computers throughout the world. No matter how humble your own computer might be, if it is connected to the Internet, you have a virtually unlimited wealth of resources available for your every day use. To whet your appetite for "Internet-working," here's a partial list of the many ways you can use the Internet: Communicating with other people: ❏ ❏ ❏ exchange electronic mail engage in online, real time discussion with other Internet users subscribe to discussion or subscription groups of people sharing your interests Accessing the resources of other Internet computers: ❏ ❏ ❏ ❏ ❏ ❏ ❏ browse through electronic library catalogs copy computer files or software from archives access databases for teaching or research obtain free electronic books use educational and information services find Internet directory services access supercomputer sites The details of how you can do all of this (and more!) is described in the rest of the chapters of NUSIRG. This document is intended to give you a brief description of what the Internet is and how it works. Chapter 2: The Internet NorthWestNet User Services Internet Resource Guide 7 OVERVIEW OF THE INTERNET What Is A Computer Network? A computer network can be as simple as two computers in an office connected by a cable. A simple computer network linking identical computers can be very useful in situations where all users are performing the same tasks, for example in a classroom or a business office. This kind of a setup allows files and mail to be transferred between the computers of the network, and may allow access to a centralized "hard disk" for sharing software, data files, and printers. But until the mid 1970's, it was difficult to link, or "internetwork," networks containing different kinds of computers. What is An "Internet?" Although simple computer networks are useful, a network which connects a variety of computers with distinctive features offers much more flexibility to its users. In such a network, you can use one kind of computer to rapidly perform complex calculations. When the first computer is done, you could use a network to send the output to a different computer more suited for easy preparation of colorful graphs. But just like people can best communicate when they speak the same language, computers can best participate in a simple network when they use the same hardware and software to code, transmit, and receive data. An "internet" is a more complex kind of computer network which allows computers with distinctive software and hardware to communicate by translating messages to a mutually understandable "communications protocol." The first real internet, ARPANET, arose from research supported by the Advanced Research Projects Agency (ARPA), now DARPA, Defense Advanced Research Projects Agency. The standardized communications protocols which made the ARPANET possible evolved from the early NCP to today's "TCP/IP Protocol Suite." TCP/IP makes certain that two computers reach an agreement about the basic rules of data exchange, and guarantees that messages are properly packaged and transmitted through the network. (References to detailed descriptions of the many activities of TCP/IP are listed at the end of this document). TCP/IP is one of the fundamental building blocks upon which standardized services can be built across diverse computers. What Is The Internet? ❏ ❏ ❏ ❏ The Internet is a network of networks, all of which use the TCP/IP protocol suite as their standard communications protocols; The Internet interconnects supercomputers, mainframes, workstations, personal computers, and even laptop computers and packet radios; The Internet is huge; as of 1991 it comprises more than 5,000 networks, serving over 350,000 hosts and is used by more than 3.5 million people. These numbers will continue to grow every day!; Perhaps most importantly, the Internet is a global village of Internet users who can communicate across the planet as easily as you might walk to your next door neighbor's house. Chapter 2: The Internet NorthWestNet User Services Internet Resource Guide 8 Internet Addresses Please read this section carefully. In order to communicate and navigate within the Internet global village, you have to know how to read and write Internet addresses. You need to specify an Internet address every time you send mail to an Internet user, or when you access Internet services like electronic library catalogs. Internet addresses are very similar to postal mail addresses in form and function. For example, here's how someone from another country might address a letter to someone in the United States: Jane Q. Public 11 Maple Street Seattle, Washington USA The address starts with a person's name. The next three lines provide increasingly general information about where she lives, from street to country. Since streets are in cities, cities are in states, and states are in countries, this can be described as a hierarchical addressing scheme. Computers accessed by users of the Internet are "network hosts." Each network host has an "address," using the same sort of hierarchical addressing scheme as postal addresses, by which it is known to computers and users of the network. Most of the time, you will be able to use Internet addresses in the Domain Name System (DNS) format. Suppose that Jane Q. Public has an account on an Internet computer at the University of Washington. (Her Internet address might look like the first line; her postal address is shown in the same format, on the second line, to illustrate the basic similarity between the two systems): Internet: US Mail: [email protected] JaneQPublic,11MapleStreet,Seattle,Washington,USA The Internet address contains the following parts: jqpublic @ ibmpc23 biology washington edu a "user-id" (User Identification) "this user-id is located at" a particular Internet host within the biology department at the University of Washington campus network, within the Internet in Washington State, within the education-oriented portion of the Internet in the U.S. While using the Internet, you may encounter or need to use another style of Internet address, which contains numbers instead of letters. This numeric addressing system is called the IP address and is in fact the addressing system by which computers are known to other computers (The Domain Name System is a convenience for us human beings, who are better at reading and remembering letters and words.) For example, the hypothetical computer at the University of Washington which is called ibmpc23.biology.washington.edu in the Domain Name System might have the following IP numeric address: Chapter 2: The Internet NorthWestNet User Services Internet Resource Guide 9 128.95.10.207 Notice that this IP address has four parts, just like the Domain Name System address. Although it may be tempting to think that the four words separated by dots in the Domain Name System translate directly to the four numbers in the IP address, this is not the case. A more appropriate analogy is the way names are paired with phone numbers; they may be assigned and reassigned arbitrarily. Domains and Hosts The first part of an Internet address in DNS format always represents the name of an individual computer, or "host." The rest of the name represents "domains" and "subdomains," which are hierarchically arranged. Consider the following three addresses: nwnet.net stis.nsf.gov nri.reston.va.us (host.domain) (host.subdomain.domain) (host.subdomain.subdomain.domain) The last part of an Internet address in DNS format always represents a "top level" domain. Within the United States, here are some of the top level domains that have been assigned: ARPA COM EDU GOV MIL NET ORG US Advanced Projects Research Agency Commercial organizations Educational and research institutions Government agencies Military agencies Major network support centers domain Other organizations U.S. geographical domains (e.g., WA.U.S.) The Internet As A Network Of Networks The worldwide Internet is currently composed of more than 5000 component networks, all of which use the TCP/IP Protocols. Many of the details of the organization and administration of the Internet within the United States could be drastically altered by pending legislation to establish a National Research and Education Network (NREN). Consequently, the information in this section is purposely fairly general. But at the very least, this section provides a broad-brush description of how the Internet in the United States is organized, as of the autumn of 1991. How the Internet Is Structured Within The U.S. Internet networks within the United States are organized hierarchically into national, regional, and various sorts of local networks. The purpose of each network is to provide Internet services to a particular geographic region or constituency. Chapter 2: The Internet NorthWestNet User Services Internet Resource Guide 10 National Networks Providers National networks provide high-speed, long distance computer communication across the United States. At the present time, there are several distinct national level networks operated by various U.S. government agencies, notfor-profit organization, and commercial enterprises. Although all of these networks span the nation, often have sites at the same locations, and all use the TCP/IP protocols, they are, for the most part, logically and administratively distinct entities that internetwork only through one or a few gateways. The most prevalent national network for the Internet user at higher educational institutions is NSFNET, which serves as the backbone connecting most regional educational networks. Here's a brief summary of some of the most widely used national networks in the Internet. ❏ NSFNET (National Science Foundation Network) was originally created to facilitate reliable communication between universities and to provide easy access to NSF-sponsored supercomputers. Its focus has now broadened to provide Internet connectivity to smaller colleges and post-secondary educational institutions. ❏ UUNET is a non-profit organization which provides electronic mail connectivity to more than 1,000 subscribing sites. ❏ ESnet (Energy Sciences Network) is operated by the Department of Energy, and is comprised of what were formerly HEPNET (High Energy Physics Network) and MFENET (Magnetic Fusion Energy Network), which connects physics departments conducting research in magnetic fusion energy. ❏ DDN (Defense Data Network) is funded by the Department of Defense, and itself contains a number of national level networks (ARPANET, DISNET, MILNET, SCINET, and WINCS) devoted to military communications. ❏ NSN (NASA Science Network) is for NASA staff, and research and academic sites performing NASA sponsored research who need access to a number of scientific databases and supercomputer sites. ❏ SPAN (Space Physics Analysis Network) is a data comparison network for researchers in Solar, Terrestrial, and Interplanetary Physics, but has since expanded to cover other disciplines. SPAN's primary services are for NASA (the National Aeronautics and Space Administration) and ESA (the European Space Agency). ❏ USAN (University Satellite Network) serves organizations doing research in the atmospheric and oceanographic sciences, featuring satellite access to the National Center for Atmospheric Research (NCAR) supercomputer facility. Regional Internet Networks Most regional Internet networks were created by funding from the National Science Foundation to provide networking services to universities and research institutions in specific geographic regions within the U.S.. Like Chapter 2: The Internet NorthWestNet User Services Internet Resource Guide 11 the national Internet networks, most regional Internet networks have a Network Information Center and a Network Operations Center. NSF-funded regional networks are connected to NSFNET at a "backbone site." For example, NorthWestNet (a regional network serving the northwestern U.S., including Alaska) is linked to NSFNET at the University of Washington in Seattle. The existence of regional Internet-based networks is generally not perceivable to the average Internet user, much as the existence of regional phone companies is usually not apparent to you when you make a long distance phone call. Many university Internet hosts are also beginning to act as local hubs to provide Internet access for primary and secondary schools. Here is a list of some of the regional networks: BARRNet: CERFnet: CICnet: JVNCNet: Los Nettos: MIDnet: MRNet: NEARnet: NorthWestNet: NYSERNet: PREPnet: Sesquinet: SURAnet: THEnet: WESTNET: "Bay Area Regional Research Network (San Francisco)" "California Education and Research Federation Network" "Committee of Institutional Cooperation Network" Illinois, Indiana, Iowa, Michigan, Minnesota, Ohio, and Wisconsin "John von Neumann Center Network"; originally a supercomputer access network, now a regional serving the mid-Atlantic states A regional network for the Los Angeles area A regional network for the Midwestern states Arkansas, Illinois, Iowa, Kansas, Missouri, Nebraska, Oklahoma "Minnesota Regional Network" "New England Academic and Research Network" Connecticut, Maine, Massachusetts, New Hampshire Rhode Island, Vermont A regional network for the northwestern states Alaska, Idaho, Montana, North Dakota, Oregon, Washington "New York State Educational and Research Network" "Pennsylvania Research and Economic Partnership Network" "Texas Sesquicentennial Network" "Southeastern Universities Research Association Network"Alabama, District of Columbia, Florida, Georgia, Kentucky, Louisiana, Maryland, North Carolina, South Carolina, Tennessee, Virginia, West Virginia "Texas Higher Education Network" A regional network for the Rocky Mountain states Arizona, Colorado, Idaho, New Mexico, Utah, Wyoming Chapter 2: The Internet NorthWestNet User Services Internet Resource Guide 12 Internet Network NICs and NOCs Most national and regional Internet networks have a NIC (Network Information Center) and a NOC (Network Operations Center). A network's NIC provides centralized support for users and User Services staff throughout their network. Typical NIC activities can include: preparing, distributing, and maintaining documentation for network users, publication of newsletters; maintenance of a central computer archive of information files or other resources; and educational training classes for the users and network staff of member institutions. A network's NOC deals with the operational aspects of running the network, including installation and maintenance of the network's hardware and software; daily monitoring and troubleshooting of the network's activity; and establishing connections to new network sites. NOC staff may also field questions from technical representatives from member institutions and from institutions which are contemplating connecting to the network. Supercomputer Access Oriented Internet Networks Finally, several Internet networks are dedicated to providing local access to the various NSF-sponsored supercomputer sites: LANL: NCSANet: PSCNET: SDSCnet: Los Alamos National Laboratory Integrated Computing Network "National Center for Supercomputing Applications Network" Illinois, Indiana, Wisconsin Pittsburgh Supercomputing Center Network Pennsylvania, Maryland, Michigan, Oklahoma San Diego Supercomputer Center Network Statewide and Within-State Networks Almost all 50 states currently have active statewide networks in place. Some of them use the TCP/IP protocols, thereby allowing attached computers to inter-communicate when connected to the Internet. Metropolitan networks are a more recent entry to the network world. As the name suggests, these networks are designed to provide network services to geographically-restricted metropolitan regions. NON-INTERNET NETWORKS There are several very important national level computer networks in the United States which do not use the TCP/IP protocols, and thus, are not technically part of the Internet. From an Internet user's perspective, a significant difficulty with non-Internet networks is that it is not possible, or at least very difficult, to perform remote logins to computers in such networks. Nonetheless, you can communicate with users and computer on many non-Internet networks via e-mail messages sent to electronic mail "gateways." Gateways are responsible for translating messages created for transport across TCP/IP networks into messages that can be transported by the other networks. Chapter 2: The Internet NorthWestNet User Services Internet Resource Guide 13 Such gateways allow you to send mail to users on such non Internet networks, and in some cases allows you to access valuable services which are offered by these networks. Corporation for Research and Educational Networking (CREN) CREN is an umbrella organization which was responsible for two national networks, BITNET and CSNET. As of October 1991, CSNET was no longer operational. BITNET, however, is still a major provider of national educational networking. BITNET--"Because It's Time Network"--was designed to facilitate electronic communications among universities throughout the world. BITNET is a strongly multi-disciplinary network with users in all academic fields. BITNET is of interest to Internet users because of a variety of unique and valuable services such as mature and widely used file and discussion list servers (such as LISTSERV). Like the Internet, BITNET has sister networks throughout the world which share network protocols (such as EARN, the European Academic and Research Network). The services of BITNET and its related networks are readily accessible to Internet users through gateways at several sites which are connected to both the Internet and to BITNET. For more information about electronic mail gateways, refer to Chapter 3 of NUSIRG. FOR MORE INFORMATION ABOUT THE INTERNET Although most information on the Internet is available as online documents, there are several notable printed books on The Internet specifically, and networking generally. Published Books And Articles About Internet Networks Frey, D. and R. Adams. 1990 !%@:: A Directory of Electronic Mail Addressing and Networks. O'Reilly and Associates, Sebastopol, CA. LaQuey, T. L. 1989. "Networks for Academics," Academic Computing 4(3):32-39. Academic Computing Publications, Inc.., McKinney, TX. LaQuey, T. L. 1990. User's Directory of Computer Networks. Digital Press, Bedford, MA. Quarterman, J. S. 1989. "Etiquette and Ethics," ConneXions - The Interoperability Report 3(4):12-16. Advanced Computing Environments, Mountain View, CA. Quarterman, J. S. 1990. The Matrix: Computer Networks and Conferencing Systems Worldwide. Digital Press, Bedford, MA. Stoll, C. 1989. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage, Doubleday, New York, NY. Published Information About Internet Protocols Comer, D. E. 1991. Internetworking With TCP/IP. Volume 1: Principles, Protocols, and Architecture. Prentice Hall, Inc.., Englewood Cliffs, NJ. Chapter 2: The Internet NorthWestNet User Services Internet Resource Guide 14 Garcia-Luna-Aceves, J. J., M. K. Stahl, and C. A. Ward. 1989. Internet Protocol Handbook: The Domain Name System (DNS) Handbook. SRI International, Network Information Systems Center, Menlo Park, CA. Stallings, W. 1990. Handbook of Computer-Communications Standards Volume 1: The Open System (OSI) Model and OSI-Related Standards; Volume 2: Local Area Network Standards; Volume 3: The TCP/IP Protocol Suite. Macmillan, New York, NY. About "Online" Internet Information The Internet is, to a large degree, self documented. There is an enormous amount of "online" information stored on computers throughout the Internet. A large percentage of such online information can be retrieved by using FTP (File Transfer Protocol), a tool for copying information to and from Internet computers. For detailed information on how to use FTP, refer to Chapter 4 of NUSIRG. About Requests for Comments (RFC's) RFC's are an essential source of information about the Internet. As of September 1991 there were more than 1,000 RFC's containing general information, technical specifications about the "nuts and bolts" of the Internet, and occasional general essays of interest to Internet users. Complete sets of RFC's are available in many "FTP archives"; one currently authoritative source of RFC's is: FTP Host: directory: files: nnsc.nsf.net rfc rfc-index.txt rfc1000.txt (a current index of all RFC's) (each RFC is named rfcXXXX, where "XXXX" is the RFC number, e.g., rfc1000) etc... Online Overviews About Internet Networks Bowers, K., T. LaQuey, J. Reynolds, K. Roubicek, M. Stahl and A. Yuan. 1990 RFC 1175: FYI on Where to Start - A Bibliography of Internetworking Information. FTP Host: directory: file: nnsc.nsf.net rfc rfc1175.txt Spurgeon, C. 1990. Network Reading List. The University of Texas at Austin Computation Center, Austin, TX. FTP Host: directory: files: emx.utexas.edu pub/netinfo/docs network-reading-list.txt network-reading-list.ps (ASCII format) (PostScript format) NSF Network Service Center. (ongoing). Internet Resource Guide. NSF Network Service Center, Cambridge, MA FTP Host: directory: nnsc.nsf.net resource-guide Chapter 2: The Internet NorthWestNet User Services Internet Resource Guide file: README 15 (copy this file with FTP for instructions on the options you have for FTP'ing or subscribing to the NNSC Internet Resource Guide) Online Information About Internet Protocols Hedrick, C. L. 1987. Introduction to the Internet Protocols. Rutgers University Computer Science Facilities Group, Piscataway, NJ. FTP Host: directory: files: topaz.rutgers.edu pub/tcp-ip-docs tcp-ip-intro.1 tcp-ip-intro.2 Hedrick, C. L. 1988. Introduction to Administration of an Internet-based Local Network. Rutgers University Computer Science Facilities Group, Piscataway, NJ. FTP Host: directory: files: athos.rutgers.edu runet tcp-ip-admin.doc tcp-ip-admin.ps (ASCII format) (PostScript format) Krol, E. 1989. RFC1118: "The Hitchhiker's Guide to the Internet. University of Illinois Urbana, UrbanaChampaign, IL FTP Host: directory: file: nnsc.nsf.net rfc rfc1118.txt Oganizations And Periodic Conferences Relevant to Internet Users ACM SIGCOMM Symposium The Association for Computing Machinery 11 West 42nd Street New York, NY 10036-8097 phone: (212) 869-7440 fax: (212) 869-0481. IDG Communication Networks Conference & Exposition IDG Conference Management Group P.O. Box 9171 Framingham, MA 01701 phone fax: (800) 225-4698 (508) 879-6700 (508) 872-8237 Chapter 2: The Internet NorthWestNet User Services Internet Resource Guide 16 Internet Engineering Task Force (IETF) Corporation for National Research Initiatives 1895 Preston White Drive Suite 100 Reston, VA 22091 Attn: IAB Secretariat e-mail: [email protected]. Internet Society 1895 Preston White Drive Suite 100 Reston, VA 22091 e-mail: [email protected] INTEROP Conference and TCP/IP OSI/ISO ISDN Internetworking Tutorials Interop, Inc.. 480 San Antonio Road Suite 100 Mountain View, CA 94040 phone: (415) 941-3399 or (800) INTEROP fax: (415) 949-1779. National Net Conference, and EDUCOM Conference. EDUCOM 1112 16th Street, NW Suite 600 Washington, DC 20036 phone: (202) 872-4200. Chapter 2: The Internet NorthWestNet User Services Internet Resource Guide 17 NREN By time you read this, NSFNET and similar national Internet networks may have been renamed "The National Research and Education Network" (NREN). In November of 1991, President Bush signed the High-Performance Computing Act which authorized the creation of a permanent NREN. The bill allocated $2.9 billion over the next five years to enhance the United States' high-performance computing and communications infrastructure. Information on the NREN is available electronically from: FTP Host: directory: files: nis.nsf.net nsfnet all files There are also online discussion groups dealing with NREN related issues: Group Name To Subscribe [email protected] [email protected] e-mail to [email protected] e-mail to [email protected] Chapter 2: The Internet NorthWestNet User Services Internet Resource Guide 18 SECTION 2: THE BASIC TOOLS Chapter 3: Electronic Mail..................................................................................................... 20 Getting Started with Electronic Mail ........................................................................ 20 Electronic Mail Etiquette ......................................................................................... 28 Electronic Mail Gateways: Sending Mail Beyond The Internet ................................ 34 Chapter 4: Using FTP ............................................................................................................ 39 What is FTP? ........................................................................................................... 39 Anonymous FTP and FTP Archives ......................................................................... 39 How Information is Arranged in FTP Hosts.............................................................. 40 Using Anonymous FTP ............................................................................................ 41 Full Service FTP ...................................................................................................... 46 The ABC's of Handling Special Files ....................................................................... 49 Chapter 5: TELNET .............................................................................................................. 53 Using TELNET........................................................................................................ 53 TELNET Trouble-Shooting...................................................................................... 63 What Resources Can Be Accessed With TELNET? ................................................. 63 For More Information On TELNET ......................................................................... 63 Chapter 6: "Archie": The FTP Archive Guru.......................................................................... 65 What Is Archie? ....................................................................................................... 65 What Is Archie Used For? ........................................................................................ 65 How Does Archie Do It?!......................................................................................... 65 What Kinds of Questions Can Archie Answer? ........................................................ 65 How Do You Use Archie?........................................................................................ 66 Things To Keep In Mind Before You Use Archie..................................................... 68 For More Information About Archie......................................................................... 69 ELECTRONIC MAIL, FTP, AND TELNET Section 2 of NUSIRG introduces you to the three basic tools for using the Internet. Once you've mastered Electronic Mail, FTP, and TELNET, you will be able to take advantage of most all Internet services. ELECTRONIC MAIL (E-MAIL) Electronic Mail is used to send messages to other people and even programs on other computers. You'll learn the basic principles of using e-mail within the Internet, and "e-mail etiquette" which apply to all forms of electronic communication with other people. At the end of this sub-section, you'll learn how to use "mail gateways" to send e-mail messages to users and computers which are not part of the Internet networks. Section 2: The Basic Tools NorthWestNet User Services Internet Resource Guide 19 FTP The File Transfer Protocol (FTP) is for copying information from one computer to another. By knowing how to use FTP, you will be able to access free information from computers throughout the world. As you will notice, many of the documents to which you are referred for more information throughout NUSIRG are from FTP archives, so you'll have many opportunities to practice your FTP skills! This subsection also includes information on how to handle archived, compressed, and binary files, which require special attention during or after an FTP transfer. TELNET TELNET allows you to actually login to and use many computers on the Internet. A modified version of TELNET called "tn3270" is often used for accessing Internet services on IBM mainframes. You'll be shown how to use TELNET to access many valuable Internet applications throughout the rest of NUSIRG, including electronic library catalogs, online databases and Internet directory services. As examples of TELNET services, you'll learn how to use a typical online Information Service, and the "Archie" program, which is designed to search through hundreds of FTP archive catalogs around the world. Section 2: The Basic Tools NorthWestNet User Services Internet Resource Guide 20 Chapter 3: Electronic Mail He opened the geography to study the lesson...they were all different places, that had those different names. They were all in different countries...and the countries were in continents, and the continents were in the world, and the world was in the universe. He turned to the flyleaf of the geography, and read what he had written there: Stephen Daedelus Class of Elements Clongowes Wood College Sallins County Kildare Ireland Europe The Universe James Joyce Portrait of the Artist as a Young Man (pg. 15) GETTING STARTED WITH ELECTRONIC MAIL What Is Electronic Mail? In most ways, electronic mail (or "e-mail") is very much like regular, postal mail. It is used to send letters or other information to other people. Instead of being delivered by the postal service to a person's house or business, e-mail is sent through a computer network to a person's computer. What Can You Do With Electronic Mail? You can use e-mail for most of the same purposes for which you can use postal mail (except for mailing physical objects). Even better, an e-mail message usually gets to its destination in minutes or even seconds, rather than in days! You can also use e-mail to communicate with special computers called "mail servers," which automatically respond to certain commands, and can send you information or files back by e-mail. This document includes an example of using a mail server so you can get some experience using e-mail on the Internet. Chapter 3: Electronic Mail NorthWestNet User Services Internet Resource Guide 21 What Do You Need To Know To Use Electronic Mail? Because you probably already know how to write and send letters, you can understand e-mail by thinking about its similarities to regular US postal mail. Suppose you wanted to write a letter to your aunt Susan Rose Allen to ask if you could stay at her farm the second week of July. All you'd have to do would be to: 1. write your letter; 2. put her name and address on an envelope; 3. and put your letter in a mailbox (Example 1). Using e-mail is just as simple, and involves exactly the same three steps: 1. write your e-mail message on a computer; 2. include the person's user-id and e-mail address; 3. and then send your e-mail message! Chapter 3: Electronic Mail NorthWestNet User Services Internet Resource Guide 22 Example 1: A typical US mail letter: James T. Allen 12345 NE 47th Ave. Seattle, Washington (1) June 1, 1991 Susan Rose Allen Idaho Creek High School 12 Apple Tree Lane Idaho Creek, Idaho Dear Aunt Susan, Do you think I could visit you the second week of July? I promise to help you pick cherries from your orchard! Well, I'd better stop writing, the mail truck is coming by in a few minutes. Please write back soon! James Example 2: A typical e-mail message: Date: From: To: Subject Mon., 6 June 91 14:22 PST [email protected] [email protected] My first e-mail message! Dear Aunt Susan, Thanks for letting me know I could visit starting July 15th. When I'm there, do you think your friend the geology teacher, Bill Diaz, could take me prospecting again in the mountains? I really enjoyed riding pack horses into the canyon last summer! Please send me a computer message back soon...This is my *first* time using e-mail and I want to be sure this gets to you. I can't believe that I can use this computer to write a message to you in Idaho! - James Chapter 3: Electronic Mail NorthWestNet User Services Internet Resource Guide 23 1. Everybody Using The Internet Has A "User-id" Before you mail a regular letter, the first thing you should know is to whom it will be sent. Usually, you'll put that person's regular name on the envelope. If you want to send e-mail to someone, you have to know their user-id. The term "user-id" is an abbreviation for USER-IDentification, and is generally pronounced "user eye dee". User-ids are often assigned by computer network authorities at a person's school or workplace. Let's look at the beginning of the second and third lines of the simple e-mail message (Example 2): From: To: jt_allen sr_allen The first line indicates that the message is from user-id "jt_allen" (James Trevor Allen) and that the message is going to user-id "sr_allen" (Susan Rose Allen). In this example, the user-id's are made in a very easy-to-understand way that you'll probably see very frequently. Both of these user-id's were made by putting together a person's first and second initials, an underline, and then the first five letters of their last name. But don't forget, there are many other ways to construct user-ids! Here are some other ways Susan Allen's name might be turned into a user-id at other Internet sites: ALLSUSR ALLENSR SUSRALL NRG1234T (ALLen, SUSan, Rose ) (ALLEN, Susan, Rose ) (SUSan, Rose, ALLen) (a completely arbitrary user-id assigned to Susan) So just because you know someone's regular name doesn't mean you can guess their user-id. You usually need to know a person's user-id before you can try to send them e-mail. Later in this user's guide, you'll learn how to find a person's user-id if you already know their real name, but there are a few other things that we need to cover first. If you're looking at Example 2 right now, you're probably wondering what the rest of the lines 2 and 3 are all about. What in the world does "[email protected]" mean? It means where (at what computer) in the Internet world Susan Rose Allen, with user-id sr_allen, has a computer account. 2. Every User-id Is At ("@") A Computer Address Once you know a person's name, the next thing you have to know if you want to write them a regular letter is their regular mail address. The same is true for e-mail: you need to know that person's e-mail address. Luckily, Internet addresses are put together in almost the same way as regular mail addresses. Chapter 3: Electronic Mail NorthWestNet User Services Internet Resource Guide 24 Look at Susan Allen's regular mail address in the US mail letter in Example 1. After her name, there are four parts to her address. This address starts with the most local information (her school) and ends with the most general (her state). This standard way of writing an address helps the postal service find the right person in the right town in the right state. After all, there might be 2 different Susan Allens in Idaho Creek, 20 different Susan Allens in Idaho, and 2,000 different Susan Allens in the United States! Computer addresses (or domain names) usually follow the same rules as postal addresses for the same reasons. Here are some important facts about Internet domain names: ❏ ❏ ❏ ❏ You read a computer's Internet domain name left to right; the first name is usually the name of a particular computer, and the last name is the abbreviation for a national or international computer domain (e.g., "edu" for the EDUcational part of the U.S. portion of the Internet, "au" for the Australian portion of the Internet, etc..). Each part of a computer's domain name is separated by a period, instead of being on a new line. E-mail addresses use many abbreviations. The particular words in each part of a domain name may have meaning, only to site administrators. Each site is responsible for choosing their own domain name, and the may as easily choose to name their computers after a cartoon character or a famous author as after a geographical location. For more information about Internet domain names, see "Internet Addresses" in Chapter 2. Well, now, let's put Susan's postal and e-mail address into the same format and compare them: e-mail: US Mail hs.idacrk.idaho.edu HighSchool.IdahoCreek.Idaho.USA How Do You Use E-mail? There are many kinds of e-mail software programs, each with different special features--so it's impossible to include instructions for every kind of e-mail software in this document. These instructions would be about 100 pages longer, and would contain a great deal of information that you--and many other people--wouldn't need! Hopefully, your instructor or your computer center staff can help get you started with the particular e-mail software used by your computers. But no matter what mail software you use, you will usually go through a few simple steps when you send e-mail. The Basic Steps For Sending E-mail Step 1. You start a mail software package by typing it's name (or on computers like the Macintosh, clicking on an icon). Mail packages are often called something like "mail" or a name containing the word "mail." Step 2. You will usually be asked to supply one or more user-ids and e-mail addresses as your list of recipients. Step 3. Very often you will be asked to supply a "subject," which should be a brief description of what the letter is about. Many mail software packages offer additional useful features for the "envelope" of the electronic letter, such as "cc:" for the sending of "carbon copies." Chapter 3: Electronic Mail NorthWestNet User Services Internet Resource Guide 25 Step 4. To draft your letter, you will usually then be able to use a mail editor, which is similar to a simple word processing program. Step 5. When you are done typing your message, you can send your e-mail message! Receiving Incoming Mail E-mail Usually the same mail software which allows you to write and send mail is also used for receiving and for displaying your mail. Incoming mail is usually stored in an electronic "mailbox" or "mailbook" which allows you to scan the subjects and user-ids of mail that has been sent to you, just like you might riffle through a pile of mail that has arrived at your house. You can read the mail with the mail editor, and send a reply back to the user-id and e-mail address in the line labelled "from." Retrieving Files via E-Mail from Electronic Mail Servers E-mail can also be used to send messages to computers on the network which will automatically send back information that you have requested. Such computers are sometimes called "mail servers." Electronic mail servers (sometimes referred to as "file servers") are programs which accept a few special commands to retrieve files from "file archives." To use an electronic mail server, send an e-mail message to the mail server's Internet address, and put requests to the mail server in the body of your mail message. Sometimes, but not always, mail server commands can be placed in the "subject:" line as well. To get started with a mail server, you should try sending e-mail with the word "help" in the message. Often, within a short time (usually minutes, but sometimes as long as a day) you should receive a message in your incoming mail with a description of how to use that particular mail server, and sometimes, detailed descriptions of what files that particular mail server contains. There are many mail servers located throughout the Internet. Here's a brief list of some mail servers containing files of general interest: Chapter 3: Electronic Mail NorthWestNet User Services Internet Resource Guide 26 E-Mail Address Partial Description of Contents [email protected] Agricultural information, Electronic Books NASA and space related files Many files useful for new Internet users, such as "FAQ" files (Frequently Asked Questions), as well as a large number of archives of USENET newsgroups Mathematical source code and algorithms. A large collection of files on many different topics: source code for most kinds of personal computers, archives of USENET newsgroups. Internet information files including RFCs and FYIs [email protected] [email protected] [email protected] [email protected] [email protected] For example, you can send mail to a computer service run by the Oregon Extension Service called "Almanac" which contains a wide variety of educationally valuable offerings such as "electronic books," and an enormous amount of information from the Department of Agriculture which you can have sent to you simply by sending email. In this example, you'll send a message to Almanac, requesting a copy of the Declaration of Independence! Step 1. Start your mail program Step 2. Address a mail message to the following Internet user-id and address: [email protected] Step 3. You don't have to include anything in the subject line Step 4. In your mail editor, type the following message: send guten dec-of-ind "Guten" is short for "Project Gutenberg", a non-profit organization dedicated to creating free electronic versions of the world's great literature and "dec-of-ind" is the file name for the Declaration of Independence. Step 5. Send the mail message. Step 6. In a short while, you should receive e-mail from Almanac. If you did everything right, it will be a copy of the Declaration of Independence! If you made a mistake, the e-mail message from Almanac will give you a hint about what you did wrong, and how to send a correct request. If you want more information about Almanac, you can send an e-mail message to Almanac containing one of the following messages: send guide (to get a copy of the Almanac Guide) Chapter 3: Electronic Mail NorthWestNet User Services Internet Resource Guide send topic catalog 27 (to get a copy of Almanac's holdings). For More Information About Electronic Mail For more information about specific electronic mail software, consult your local users service staff or your instructor. If you are using a mainframe computer, you may also be able to get help by typing "man mail" (on UNIX computers), or "help mail" (on most other mainframes). Many of the technical details about how e-mail is packaged and handled on the Internet are specified in the following "RFCs" (Requests for Comments): RFC822 Crocker, D.H. Standard for the Format of ARPA Internet Text Messages RFC821 Postel, J.B. Simple Mail Transfer Protocol RFC974 Partridge, C. Mail Routing and The Domain System These and all other RFCs can be obtained from a number of FTP archives around the world. One currently authoritative FTP archive for RFCs is: FTP Host: directory: files: nnsc.nsf.net rfc rfc-index.txt rfc1000.txt etc... a current index of all RFCs each RFC is named rfcXXXX, where "XXXX" is the RFC number, e.g., rfc822 For more information about using FTP (File Transfer Protocol), refer to chapter 4 of NUSIRG. For More Information About Electronic Mail Servers Jonathan Kamens of MIT maintains a file called "How To Find Sources" which contains a listing of useful electronic mail servers (along with many other useful sources of information). Rather appropriately, this file is itself available from a mail server. To get this file, address an e-mail message to: [email protected] containing the following message, all on one line, with every character entered EXACTLY as shown: send usenet/comp.sources.wanted/How_to_find_sources_(READ_THIS_BEFORE_POSTING) Chapter 3: Electronic Mail NorthWestNet User Services Internet Resource Guide 28 ELECTRONIC MAIL ETIQUETTE Undirected by culture patterns--organized systems of significant symbols--man's behavior would be virtually ungovernable, a mere chaos of pointless acts and exploding emotions, his experience virtually shapeless. Culture, the accumulated totality of such patterns, is not just an ornament of human existence but ... an essential condition for it. Clifford Geertz The Interpretation of Cultures (pg. 46) More often than not, what brings a stranger to his knees here is waving. Waving--it looks like a simple act, but it's almost as complicated as spoken Minnesotan. Howard Mohr How To Talk Minnesotan (pg.182) There are a number of important and generally agreed upon do's and don'ts which you should at least consider when you use e-mail. Of course, as with all kinds of etiquette, there are no absolute right and wrongs, only modes of behavior which are deemed acceptable by the community of people with whom you are communicating. Therefore, these should be treated as suggestions, rather than inviolable rules. This list may seem long and somewhat arbitrary, but after reading many mail messages from many other people (and examples 1 and 2, which, respectively, follow and violate these suggestions), you will probably understand why these principles make good sense. Etiquette and E-mail style Here is a list of some simple guidelines or suggestions for using electronic mail acceptably: ❏ ❏ ❏ ❏ ❏ Be brief. You can often fit everything you need to communicate in one screen of text. Try to keep the length of the lines in your e-mail below 65 columns; short lines are easier to read, especially on a computer screen, and other people's terminals may not be able to display more than 70 columns, so they may not be able to read the ends of long lines. Use blank space between paragraphs or other logical units of text to break the text up for the eye. Use mixed upper and lower case and standard capitalization. Mixed-case text is much easier to read than all lower or all upper case; even worse, USING UPPER CASE WHEN YOU WRITE IS LIKE SCREAMING WHEN YOU SPEAK! Most computer terminals do not display underlined or italicized characters, which are commonly used to provide emphasis in handwriting. So, if you want to emphasize something, you can use all-capital letters for what you REALLY want to emphasize. Another way to emphasize a word is to put asterisks, Chapter 3: Electronic Mail NorthWestNet User Services Internet Resource Guide ❏ ❏ 29 underlines, or other special characters at the beginning and end of a word or phrase, like *this*, or like _this_, or >even< like that! Keep your paragraphs short; in general, fewer than 15 lines should be about right. (Notice how much easier it is to read this paragraph than the one above.) Avoid using control sequences (like "ctrl z") or special keys (like tab bars), even if they seem to work fine while you are editing your mail document. Such special characters may alter the display of your message making it virtually unreadable on the other person's computer terminal. Etiquette and E-mail content ❏ ❏ Begin your text with the name of the person to whom you are writing, just like you'd begin a regular letter. Even though the person's name is in the mail header, starting your text with their name makes your message seem more personal. If you are responding to someone else's mail, you might want to include short, relevant passages from the original message. This will be useful to establish context, or give your e-mail more of a conversational tone. The standard convention used in the Internet community is to: > ❏ ❏ ❏ begin each line from their message with a "greater than" sign, like this. Some mail software allows you to automatically include someone else's mail message in your outgoing message. You are then free to edit out the lines you don't want to include. Be careful *not* include their entire message unless you have to! This wastes resources used for transmitting and storing mail, and may waste the time of the person to whom you are writing. Never forget that the person to whom you are sending mailing is another human being, with feelings and beliefs that may be very different from yours! This can be easy to forget when you are sitting at a computer terminal, writing a mail message to a person you might never have met in real life, and about whom you may know very little. In face-to-face conversation, there are many subtle cues provided by body language and intonation that let us know how what we are saying is affecting the other person. These cues are completely absent when using e-mail, so strive to be concise, clear, and polite in your own writing, and flexible in your interpretation of other people's mail. This follows an old networking axiom: "be precise in what you send, and forgiving of what you receive." Since e-mail doesn't contain physical cues, a number of conventions peculiar to e-mail have been developed. In particular, a "smiley" is used to indicate that the previous statement that is meant in a light-hearted or humorous way. "Smileys", when looked at sideways, look vaguely like "stick drawings" of human faces. There are hundreds of smileys that can be made with the basic characters of a keyboard, each of which conveys a slightly different meaning. Here is a small audience of smileys to give you an idea: :-) the basic smiley ;-) the winking smiley ;^} a slightly more sinister winking smiley :-\ a consternated smiley ❏ ❏ End the text of your message with your name. Again, this makes your mail feel more personal to the reader. With some mail software, you can easily create a file called a "signature" (or "sig") which is automatically added to every outgoing mail message you send. If you *do* use a sig Chapter 3: Electronic Mail NorthWestNet User Services Internet Resource Guide ● ● ❏ 30 Keep your sig short, fewer than five lines is enough. Don't include a lot of graphics made of letters and characters, lists of all possible telephone numbers, postal, and e-mail addresses at which you can be contacted, or your favorite quotes. At the very least, such sigs can be annoying, and at worst, they take up space in other people's computers. And finally, before sending off your e-mail message: ● ● ● ● Look over what you have written. Make sure you've said everything you needed to say. Make sure you haven't said things you didn't need to say. Make sure you've used correct spelling and grammar. splling errers end bad grammers make it harder for uther peeple to reed what you wrought.:^) Etiquette and the Sending of E-mail Many mail software packages allow you to add a person's real name to the "TO:" field. This adds a humanizing touch to your mail messages. Most people prefer to be called by their real names, rather than some arbitrary userid! Use short, informative, subject lines. You can usually summarize what your message is about in fewer than 40 characters; and in many cases, software for receiving e-mail only displays the first 15 or 20 characters! Most mail software packages have a "CC:" (Carbon Copy) option. This will cause your mail to be sent to additional people who are at least marginally interested in what you have sent to the person indicated in the "TO:" field. For example, in the correspondence between Bill Diaz and James Allen in the Introduction to Mail section of this User's Guide, Bill and James might "CC:" Susan Allen on many of their messages. This is a very sensible thing to do since Susan will want to know how Bill and James' plans would affect the timing and activities of James' visit to Idaho Creek. Chapter 3: Electronic Mail NorthWestNet User Services Internet Resource Guide 31 In Summary: The following page summarizes all of these points of e-mail etiquette. The page after the e-mail etiquette summary gives examples of these do's and don'ts in action: ❏ Example 1 illustrates the intelligent and tasteful use of these rules of etiquette and style. See how much more pleasant and easy to read it is than Example 2, which violates every rule that has been suggested. ❏ Example 2 may seem extreme, but as everyone who has used the Internet can attest, such examples*do* occur! Such an e-mail message is an embarrassment for the person sending it, and an annoyance to the person(s) receiving it. The Basic Principles of E-mail Etiquette Be brief. Keep line lengths to less than 65 columns. Use blank spaces between paragraphs to help the reader's eye. Use mixed upper and lower case. Use capitals AND special characters for *emphasis*! Keep your paragraphs short. Fewer than 15 lines is best. Avoid control characters or special keys. Begin text with the real name of the person you're writing. If useful, include parts of mail to which you are replying. End the text of your message with your real name. If you use a "sig", keep it short and simple. Review what you've written BEFORE you send it. Include the person's real name in the "TO:" line of the header. Use the "CC:" option if available and if appropriate. Chapter 3: Electronic Mail NorthWestNet User Services Internet Resource Guide 32 Example 1: E-Mail Following Suggested Etiquette Guidelines Date: Wed. 8 June 91 10:45 MST From: Bill Diaz <[email protected]> To: Jim Allen <[email protected]> CC: Susan Allen <[email protected]> Subject: Prospecting in Ponderosa Canyon Jim, I'm *delighted* to hear you're visiting this summer! In your last letter to Susan, you wrote: > When I'm there, do you think that geology teacher Bill Diaz > could take me prospecting again in the mountains? Well, absolutely! I'd be glad to have you come along! I've planned a trip from July 24-27, if that fits with your plans. Here's some things to get ahold of before you visit: a geological hammer a good field guide for rocks and minerals a *light* sleeping bag (remember how HOT you were in that down bag last summer? :-) a sturdy pair of hiking boots a pair of plastic sunglasses If you need advice on what to get, feel free to contact me! Take care, Bill 49 Pear Tree Lane Idaho Creek Idaho Example 2: E-Mail Violating Suggested Etiquette Guidelines Date: Wed. 8 June 91 10:45 MST From: [email protected] To: [email protected] I'm delEted to hear that you're visiting us in Idaho Creek again th r! I'd be happy to have you come pospecting. I've already planned a m July 24-27. Here's some things you should prbably bring along: ^Z logical hammer, a g od field guide f rocks and minerals, a light sleep if king boots, and sunglasses with plastic boots would be Free to MAil ba ser-id. Here's my sig!/^ ^ / \ /\ /\ \ | / /'tis a gift to be sim ^ _ /----\ / \ / \ \ | / /'tis a gift to be free / \ / /\/\ \/----\ /----\ \ / /+------------------/ \ /"home is\ / \ O / |__ o | | / \ / where the\ \ / | \ | | | / \heart is" \ |__/ _|_ _|_ _|_ tel: (208) 999-1234 (home) 999-4321 (woodshed) 999-3456 (car fax) user-ids: [email protected] (INTERNET) dt_diaz@idacrkh Chapter 3: Electronic Mail NorthWestNet User Services Internet Resource Guide 33 For More Information About E-Mail Etiquette Most of the principles discussed in this chapter are derived from the following sources: Published Articles Quarterman, J. S. 1989. "Etiquette and Ethics", ConneXions--The Interoperability Report 3(4):12-16. Advanced Computing Environments, Mountain View, CA. Online Information The following articles are "periodic postings" which appear in the USENET newsgroup "news.announce.newusers". Although they are aimed specifically at USENET users, many of the principles they espouse are relevant to all electronic mail communication. For more information on how to use USENET, see Chapter x of NUSIRG, "Using USENET." Offutt, A.J., and G. Spafford 1991. "Hints on Writing Style for USENET." Templeton, B., and G. Spafford. 1991. "Emily Postnews Answers Your Questions on Netiquette." (A tongue-incheek, very funny, but very informative essay on what not to do in electronic mail, especially in USENET postings). Von Rospach, C. and G. Spafford. 1991. "A Primer on How to Work With the USENET Community." Chapter 3: Electronic Mail NorthWestNet User Services Internet Resource Guide 34 ELECTRONIC MAIL GATEWAYS: SENDING MAIL BEYOND THE INTERNET What Are Electronic Mail Gateways? Mail gateways are computers which allow mail and other messages to be transmitted between networks which use different methods of addressing and packaging information. Why Are Gateways Necessary? Many computer networks are not part of the Internet, and do not use the Internet Protocols (IP). Recall that if you want to send an e-mail message anywhere in the Internet you would use the standard IP address format: [email protected] But many networks use very different formats for their addresses. As an extreme, here's an example of an address in SprintMail, which is not an Internet network: [user/organization]system/country Internet mailers cannot read this address, because it contains information and symbols which are not part of an Internet address. (Much like your postman might have trouble delivering a letter with an Internet address!) Furthermore, the actual way in which mail messages are packaged in other networks may be considerably different. Mail gateways are able to resolve differences in both addressing and packaging when transmitting information between networks. How Do You Use Electronic Mail Gateways? You need to know four things to send mail to users and computers on other networks: ❏ The addressing convention of the network to which you are sending mail; ❏ How to "package" the address information for the other network in a way that it will not be inadvertently modified on its way to the intended destination; ❏ The address of the appropriate gateway computer, and, of course, ❏ The address information of the person or computer on the other network. All of the information you need to answer questions 1-3 for many of the more commonly used non-Internet networks is provided in Table 1. The basic strategy used by mail gateways from the Internet to other networks is to put the other network's addressing information in the "user-id" field of the Internet DNS address. It is also necessary to provide the Internet address of the appropriate e-mail gateway. Chapter 3: Electronic Mail NorthWestNet User Services Internet Resource Guide 35 For example, suppose you want to send an e-mail message to a user who has an account on a BITNET host. The typical user-id and e-mail address within the BITNET network looks like this: bituser@bithost To send an e-mail message to our friend "bituser" from a computer in the Internet, we need to include their userid, their particular BITNET host's name, and the Internet address of an Internet-BITNET gateway (gateways between the Internet and BITNET are often referred to as "Interbit" gateways) Here's a general example of how this would be done: 1. Their BITNET address bituser@bithost 2. The address required for forwarding by an Interbit gateway: bituser%[email protected] where "An.Interbit.Gateway.Address" is one of the several computers which are connected to both the Internet and to BITNET, and whose administrators have agreed to provide Interbit gateway services.. How to Use the Mail Gateways Table As the previous example demonstrates, you need to know the Internet addresses of gateways which are appropriate for sending e-mail to users on non-Internet networks. The "Table of Mail Gateways from Internet to Other Networks" (below) provides this information for some of the many networks to which Internet users frequently send e-mail. In order to learn how to use this table, work through this example. Suppose you wanted to send an e-mail message to a friend who has an account on the FidoNet network. They've told you that their FidoNet addressing information is: Kelley Meithisson at 3:56/67 Look in the first column to find Fidonet. Read across to the line labelled "1)." This shows a typical FidoNet userid and address, which corresponds to your friend Kelley's address information above. Now look at the next line, labelled "2.". This shows how Kelley's FidoNet address should be translated by an Internet user so that an email message will be successfully sent to a FidoNet user. According to line 2, Kelley's FidoNet address should be translated to: [email protected] This address is now acceptable to mailers which conform to the Internet standards, and once it arrives at the Internet--Fidonet gateway, it will be translated to a FidoNet address format and delivered within the FidoNet network to Kelley. Chapter 3: Electronic Mail NorthWestNet User Services Internet Resource Guide 36 Table Of Mail Gateways From Internet to Other Networks Network 1) addressing syntax within the other network 2) addressing syntax for mail sent from Internet Applelink 1) user-id 2) [email protected] BITNET 1) user-id@site 2) [email protected] OR user-id%[email protected] Notes: At many Internet sites, you can address mail to BITNET users with the simple "[email protected]". If this doesn't work, try the following syntax to use one of the Internet--BITNET gateways: user-id%[email protected] where "An.Interbit.Gateway.Address" is anyone of the following: CORNELLC.CIT.CORNELL.EDU CUNYVM.CUNY.EDU MITVMA.MIT.EDU CompuServe EASYnet/ DECnet Cornell University City Univ. of New York M.I.T. 1) 7xxxx,yyy 2) [email protected] 1) user-id@host 2) [email protected] ESnet 1) user-id@host 2) [email protected] FidoNet 1) Firstname Lastname at 1:2/3 2) [email protected] JANET 1) [email protected] 2) user-id%[email protected] MCI 1) FirstName LastName (123-4567), where 123-4567 is an MCI phone id # 2) [email protected] PSInet 1) user-id@host 2) user-id%[email protected] Sinet 1) node::user-id Chapter 3: Electronic Mail NorthWestNet User Services Internet Resource Guide 37 2) [email protected] or 1) node1::node::user-id 2) user-id%[email protected] SPAN 1) user-id@host 2) [email protected] THEnet 1) user-id::host 2) [email protected]@relay.the.net UUNET 1) user-id@site 2) user-id%[email protected] VNET 1) user-id@host 2) [email protected] For More Information on Electronic Mail Gateways A good online source of information about gateways from the Internet to other networks is: "The Inter-Network Mail Guide," by John Chew, which is available from the following FTP archive: FTP Host: directory: file: ra.msstate.edu ftp/pub/docs internetwork-mail-guide (For information on how to use FTP, see chapter 4 of NUSIRG.) Chew's document is also posted periodically to the following USENET discussion groups: comp.mail.misc new.newusers.questions (Please see Chapter 7 of NUSIRG for more information on using USENET.) and is available from the following LISTSERV list: mail: subject: message: listserv%[email protected] (none necessary) get network guide For information on how to use LISTSERV, see Chapter 8 of NUSIRG. Printed Books On Gateways The following three reference books are invaluable resources for understanding the intricacies of electronic mail gateways, specifically, and intercommunication between networks generally: Chapter 3: Electronic Mail NorthWestNet User Services Internet Resource Guide 38 Frey, D., and R. Adams. 1989. "!%@:: A Guide to Electronic Mail Networks and Addressing. " O'Reilly and Associates, 981 Chestnut Street, Netwon, MA. LaQuey, T.L. 1989. "User's Directory of Computer Networks." Digital Press, Bedford, MA. Quarterman, J. S. 1990. " The Matrix: Computer Networks and Conferencing Systems Worldwide". Digital Press, Bedford, MA. Chapter 3: Electronic Mail NorthWestNet User Services Internet Resource Guide 39 Chapter 4: Using FTP WHAT IS FTP? FTP means "File Transfer Protocol." The purpose of FTP is to allow quick and easy transfer of files between computers connected to the Internet. There are two kinds of FTP access: "anonymous FTP," and what we'll refer to as "full service FTP." We'll start by explaining how to use anonymous FTP. ANONYMOUS FTP AND FTP ARCHIVES "Anonymous FTP" allows anyone on the Internet to access computers which contain "file archives." File archives on hundreds of anonymous FTP hosts throughout the world contain: ❏ ❏ ❏ ❏ ❏ ❏ text files (such as this document), computer software for personal computers and mainframes, computer graphics, archives of scientific, sociological, historical or other sorts of data, archives of on-line discussion groups, and and any other kind of information that can be stored in a computer. "Anonymous FTP hosts" are accessible to all Internet users who have FTP installed on their computers. Chapter 4: Using FTP NorthWestNet User Services Internet Resource Guide 40 HOW INFORMATION IS ARRANGED IN FTP HOSTS If you're not familiar with the concept of directories, please read this section before continuing. The information in most FTP hosts is arranged in a hierarchical file system. a branching system usually diagrammed as an upside-down tree. The "root" of this tree is the "root FTP directory," which is where you start when you enter an FTP host. You can think of the subdirectories as branches, and files as the tips of branches. Here's a diagram of the part of the directory structure of the FTP host, ftphost.nwnet.net, which leads to the directories and files we'll be dealing with in this chapter. ftproot / \ / \ / \ / pub (& many files / directories nic not shown) / \ / (many files & / directories nwnet not shown) / \ / (many files & / directories learnftp not shown) /|\ / | \ / | \ / | \ / | \ file1 file2 more directories Keep this image of an upside down tree in mind whenever you use FTP hosts, and navigating through FTP directories should be much easier for you. Each directory has a name which describes what it contains. In this example, "nic" is for "network information center," "nwnet" is for "NorthWestNet" and so forth. Another way of looking at this system is to think of directories as the electronic equivalent of manila folders, which can hold individual documents (files), or even other folders, and so on. For example, you might have a folder in your desk called "Letters." Inside this folder, you might have other folders labelled "Amie," "Doug," and "Kristine," holding letters to and from these friends. Inside the Kristine Chapter 4: Using FTP NorthWestNet User Services Internet Resource Guide 41 folder, you might also have another folder named "Mexico, 1990," which would hold those letters Kristine wrote to you during her trip to Mexico. USING ANONYMOUS FTP Getting started: On most mainframes, workstations, and many personal computers, you should be able to start an FTP session simply by typing "ftp." However, if you are using a computer which uses "pull down menus," such as the Apple Macintosh, DOS machines running Windows, and some workstations, you might have to start FTP by clicking an icon. Look for a file called NCSA Telnet, Mac TCP/IP, or any application file which contains the letters TELNET, TCP, IP, or FTP. Once you've launched FTP from a menu driven application, you should be able to follow the examples as they are written, but you might also have the option of automating much of your session with special features from the menu. The following example will demonstrate and explain the steps you'll need for most anonymous FTP sessions. Everything you should type is printed in lower case letters. What you want to do: What you type: 1) Start the FTP program: ftp 2) Select an FTP host: open ftphost.nwnet.net 3) Identify yourself type your FTP login name type your FTP password anonymous (usually) 4) Move to the /learnftp directory cd nic/nwnet/learnftp 5) List the contents of the learnftp directory dir (or ls) 6) Copy the file "readme.ftp" to your computer get readme.ftp 7) Explore the FTP host cd directory-name (go DOWN tree to a directory) cdup (to go UP the tree one level) pwd (Print Working Directory's name) dir (directory's contents) 8) Quit an FTP session quit (use anytime) Feel free to explore! But be careful. You may be surprised to find just how much material you can copy in a very short time. Chapter 4: Using FTP NorthWestNet User Services Internet Resource Guide 42 Commonly Used FTP Commands Command Meaning or Action ftp name password cd (& cdup) dir (or ls) ascii start an FTP session identify yourself to an FTP host same change directories down (and up) list the contents of a directory prepare FTP for a text-only transfer prepare FTP for a binary file transfer copy a file from FTP host to your computer end your FTP session binary get quit A Short List of Particularly Good FTP Hosts There are thousands of Anonymous FTP sites around the world. The "For More Information" section tells you how to obtain a large list of such sites. In the meantime, here are examples of some generally useful and well organized FTP hosts in the United States so you can start exploring right away. Have fun! ames.arc.nasa.gov archive.cis.ohio-state.edu belch.berkeley.edu cs.arizona.edu export.lcs.mit.edu ftp.cs.toronto.edu ftp.cs.widener.edu ftp.uu.net gatekeeper.dec.com genbank.bio.net grape.ecs.clarkson.edu ics.uci.edu pit-manager.mit.edu scam.berkeley.edu ucsd.edu uu.psi.com uxc.cso.uiuc.edu wuarchive.wustl.edu An Expanded Sample Anonymous FTP Session Here's a more expanded version of this one page summary, which describes an FTP session, step by step. Note that after typing a command, you should press the RETURN or the ENTER key (whichever works) to send what you've typed to the FTP host. If you're feeling adventurous, try one of the FTP hosts above and do some exploring! Step 1. Starting FTP (the 'ftp' command) Type ftp (or launch FTP from a pull down menu): ftp You should now see the FTP prompt, which will be with you throughout your FTP session: Chapter 4: Using FTP NorthWestNet User Services Internet Resource Guide 43 FTP> Step 2. Opening a Connection to an FTP Host (the 'open' command) To establish a connection to an FTP host, just type "open" followed by the full Internet address of the FTP host. In this example, we'll use the NorthWestNet FTP host to get you started: FTP> open ftphost.nwnet.net Step 3. Identifying Yourself to the FTP Host (name & password) Supply a user-id and password. The user-id is usually "anonymous". Almost all FTP sites will accept the word "guest", but sometimes you will see a message, like this one, that asks for "your ident" or "your real ident". In such cases, the FTP administrator would like you to type in "[email protected]" as the password: FTP> NAME (FTPHOST.NWNET.NET:): anonymous FTP> Guest login ok, send ident as password: your-user-id Step 4. Changing Directories (the 'cd' command) You are now ready to locate the files you want to copy. We've set up a special directory in the NorthWestNet FTP host to teach you how to use FTP. To get to this directory, type: FTP> cd nic/nwnet/learnftp 'nic' means 'Network Information Center'; the meanings of the rest of the directory names should be apparent... Step 5. Listing the Contents of a Directory (dir & ls) Now ask ftphost.nwnet.net for a listing of the contents of the "learnftp" directory. Most FTP software supports two commands to display listings of a directory's contents--you can use: ls display a simple listing of files, or dir display a list of files including directory information Here's a comparison of the listing of the learning directory provided by '"ls" and "dir'" (Don't forget that the FTP host will print out other messages as well. We just want you to concentrate on the listings of the files and directories as shown below.) FTP> ls readme.ftp compressed-files explore.ftp ftphost.list.txt ftphost.list.Z FTP> dir -rw-r--r-- 1 20080 staff 4532 Oct 22 2:01 README.ftp Chapter 4: Using FTP NorthWestNet User Services Internet Resource Guide drwxr-xr-x -rw-r--r--rw-r--r--rw-r--r-- 1 1 1 1 bin 20080 20080 20080 system staff staff staff 512 5365 49462 168372 44 Oct Oct Oct Oct 22 23 23 22 9:17 4:02 1:03 9:14 compressed-files explore.ftp ftphost.list.txt ftphost.list.Z Using "ls" gave a quick and simple list of the contents of the directory. Using "dir" provided considerably more information. Most importantly for our purposes right now, the command 'dir' allows us to determine: a. Whether the entry is a file or a directory (in column 1, '-' means file, 'd' means directory), you cannot use FTP to get directories, only files. b. The size of the file in bytes (the column before the months). You should make sure the files you are about to copy will fit in your local computer. c. The date and time of creation of the file or directory. This information is useful if you know that a certain file is in several FTP hosts, and you want to try to get the most recent copy. d. The last part(s) of a file's name often gives some indication about what format the file is stored in. In this directory, there are different versions of the file 'ftphost.list' which contain the same information, stored in different formats. The file 'ftphost.list.txt' is a text only file, the file 'ftphost.list.Z' is a compressed file. Step 6. Copying a File (get) The file "README.ftp" is a standard, text only file, so set your FTP session to ASCII mode, and then use the get command to copy the file to your local computer. (Note that we type the filename EXACTLY as it appears: upper case for README, lower case for ftp.) FTP> ascii FTP> get README.ftp readthis.ftp The file "readme.ftp" has now been copied to your computer, and has been put into your computer as a file called "readthis.ftp" in the directory from which you started FTP. When copying a file from an FTP archive, you have the option of providing a new name for your local copy of the file. Although files stored in FTP archives usually have informative and easy to use names, you will inevitably encounter some extremes. Some FTP archive maintainers prefer cryptic filenames (e.g., a file could be called "t" in one FTP archive, while other FTP archive maintainers go to an expository extreme and store the same file as "Before-You-Copy-This-GECKO-GRAF.doc-file-be-sure-you-fed-your-cat".) Strive to create concise and meaningful names for files you've FTP'd. If your computer's operating system uses a hierarchical file system (with directories), thoughtful organization and naming of directories can help tremendously by providing positional information (e.g., you could store the above file in the directory path "cat/fed" as file "GeckoGraf.doc"). Of course, you must be aware of the file naming conventions used by your computer's operating system. For example, IBM PC's running DOS require filenames to fit the following format: A:filename.ext where "A" indicates a disk drive, "filename" is a name no longer than eight characters in length, and "ext" is a filename extension no more than three characters long. For example, the FTP command: Chapter 4: Using FTP NorthWestNet User Services Internet Resource Guide 45 get ftphost.list.txt A:ftplist.doc would result in a file on your "A disk drive" with an orthodox DOS name. Other operating systems, such as UNIX and Macintosh OS are less restrictive about filename lengths, but may still prohibit the use of certain characters in filenames. Step 7. Exploring an FTPhost (cd, cdup, dir, pwd) If you followed the instructions up to this point, you should currently be in the 'learnftp' directory, within the 'nwnet' directory, within the 'nic' directory. A much easier way of representing this is: /nic/nwnet/learnftp You can type "cdup" or "cd .." to go back one directory, and then "pwd" to print your current directory (Print Working Directory): FTP> cdup FTP> pwd current directory is /nic/nwnet You can then type dir to see what's in the "nwnet" directory. If you want to go into a directory within the "nwnet" directory, you'd type FTP> cd directory-name or if you wanted to go back another step in the directory, you could type FTP> cdup FTP> pwd current directory is /nic Of course, if you find something you want to copy, you would use the get command, just as described previously in Step 6. With these four commands--cd, cdup, dir, and pwd--you can explore the contents of this and any other FTP host in the world. Step 8. Ending an FTP Session Just type: FTP> quit and you should be back in a normal session on your computer. Depending upon the particular version of FTP you are running, you may be able to take shortcuts here and there. There are also many messages which the FTP host will send to your screen, but for the sake of simplicity, we have only included the most important in this example. Chapter 4: Using FTP NorthWestNet User Services Internet Resource Guide 46 FULL SERVICE FTP If you have computer accounts on two or more computers on the Internet, "full service" FTP makes it possible for you to move files from one of your accounts to the other(s). With full service FTP, you can put files into an account, and remove files or directories from that account. Here's an example full service FTP session: Step 1. START FTP Just type: ftp Step 2. NAME A COMPUTER ON WHICH YOU HAVE AN ACCOUNT Type "open" followed by the Internet address of a computer on which you have an account: FTP> open YOUR.HOSTS.INTERNET.ADDRESS Step 3. SUPPLY YOUR USERID AND PASSWORD Name (your.host.internet.address): your-user-id Password required for YOUR-USER-ID. PASSWORD: your-password 230 User YOUR-USER-ID logged in. FTP> delete dead.letter 250 DELE command successful. FTP> quit 221 Goodbye. Chapter 4: Using FTP NorthWestNet User Services Internet Resource Guide 47 Getting Help In FTP Whenever you are using FTP, you can type help to get a list of all the commands which are available to you. Here's an example of the help listing given by a typical UNIX FTP host: FTP> help ! $ account append ascii bell binary bye case cd cdup close cr delete debug dir disconnect form get glob hash help image lcd ls macdef mdelete mdir mget mkdir mls mode mput nmap ntrans open prompt proxy sendport put pwd quit quote recv remotehelp rename reset rmdir runique send status struct sunique tenex trace type user verbose ? Now type help for any command, and you'll get a terse definition of what the command does: FTP> delete help delete delete a file Because there are several versions of FTP for different operating systems, it's always a good idea to type "help" and see what commands are available if you are having problems. You might find that some familiar commands are not present on the machine you are using. Using FTP on IBM CMS and TOPS-20 mainframes is different from the examples given above, so be forewarned! Finding Out if FTP is on your Computer If simply typing FTP doesn't give you the FTP prompt you can find out if FTP is available by asking your instructor or your user services staff. As mentioned above, you may have to invoke a software package of which FTP is a part. For example, some packages on computers such as the Apple Macintosh, IBM PCs, and Amigas, may have FTP bundled with other applications. You can also try your local online help system. Here are some of the more common forms of help syntax you might use. help ftp or help tcpip man ftp or man ftpd find telnet or find tcp VMS, CMS, some Unix machines most Unix machines Macintosh (using the Find File application from the "apple" menu) Chapter 4: Using FTP NorthWestNet User Services Internet Resource Guide 48 For More Information On FTP "List of Anonymous FTP Sites," Jon Granrose. FTP Host: directory: files: pilot.njin.net pub/ftp-list README help index ...and many others Two USENET newsgroups deal specifically with FTP archives. Read chapter 8 of NUSIRG for more information on using USENET. comp.archives: comp.archives.admin: Announcements about new and Updated FTP files Frequent discussion about FTP archives, access, administration, etc.. For example, the "Short List of Particularly Good FTP Hosts" provided in this chapter was derived from a posting by Ed Vielmetti to the group "comp.archive.admin." Technical References On FTP Comer, D. E. 1991. "Internetworking With TCP/IP." Volume 1: Principles, Protocols, and Architecture. Prentice Hall, Inc., Englewood Cliffs, NJ. Chapter 23. RFC959: The File Transfer Protocol (available via anonymous FTP from nis.nsf.net in the "rfc" directory). Chapter 4: Using FTP NorthWestNet User Services Internet Resource Guide 49 THE ABC'S OF HANDLING SPECIAL FILES Archives, Binary Files, and Compressed Files Many files on FTP archives and other computers are in a text only format which can be copied directly to your computer and displayed with a text editor without any special processing. However, you will certainly encounter computer files which are stored in special forms, and need to be transferred and/or processed in particular ways if you want to be able to use them. There are three main kinds of special formats to look out for: ❏ ❏ ❏ binary files compressed files archived file groups and any combination of these three. Before going through some examples of how to process archived, compressed, and binary files, some definitions will be useful. Archived File Groups When several files are logically related in some way, they are sometimes put together and stored as one archive file. This makes it easier for you to copy the information to your computer. You need only to use the FTP "get" command once to transfer the whole archive file to your computer. You can then run a program on your local computer to unpack the archive into its component files. One commonly encountered archive format on the Internet is called "tar", which is short for "tape archive." These tar archives are created, and unpacked, using the tar program on UNIX copyrighted computers. Files which have been archived with tar should contain the word "tar" at or towards the end of their filename. Similarly, there are other archive programs for UNIX and most other computer operating systems, and each one of these will add a special suffix to the file's name. For example, there is a file containing a complete, text only copy of NUSIRG on ftphost.nwnet.net, in the directory path /nic/nwnet/users-guide, called nusirg.whole-guide.txt.tar.Z. But what does the "Z" in the filename "nusirg.whole-guide.txt.tar.Z" mean? Compressed Files As the name suggests, compressed files are files which have been made smaller so that they take up less space on a computer disk or other storage media. Because they are smaller, compressed files are also transferred through the Internet more quickly than the original, uncompressed files. Chapter 4: Using FTP NorthWestNet User Services Internet Resource Guide 50 In the example above, the letter "Z" indicates that the file "NUSIRG.txt.tar.Z" has been compressed by the Unix compress program. Again, there are many other compression programs for UNIX and other operating systems, and each will add a particular suffix to the file's name. Binary Files Text on most computer screens is displayed as lower and upper case letters, numbers, and special characters, such as !,@,#, and so forth, which are easy for you to read. The only information computers can "read," however, is binary code, numbers made up of 1's and 0's. Most computers use standard translation conventions, either ASCII or EBCDIC, to store text. Binary files, on the other hand, typically refer to "non-text" files such as bitmaps or computer programs. Most compressed files are stored in "binary" format. The important thing to remember about binary files when you use FTP is that they must be transferred using FTP binary mode. Otherwise the file will be translated to ASCII (or EBCDIC for IBM users) and be useless when it gets to your computer. You put FTP into binary mode by typing the word "binary" at the FTP prompt. When you're not sure what format a file is in, you should try using binary. Regardless of whether it is actually in binary or ASCII, the file will usually get to your computer just fine. You should be aware that FTP's on some computers have additional modes which you might need to use, such as tenex. Quick Guide to Common Un-Archive and Un-Compression Programs Some FTP hosts have a README file in each directory which provides brief descriptions of the file in that directory. The README file also indicates which, if any, of the files in the directory need special handling, and if so, what that handling should be. It's always a good idea to get such README files before you start getting a lot of files from an FTP host. It can save you a lot of grief! However, many FTP hosts do not have these files (and sometimes we are too impatient to take the time to get README files), so sometimes we have to guess. Suppose you FTP'd the following files onto a UNIX computer: file1.txt file2.shar file3.tar.Z In the paragraphs below, you can find out what needs to be done to each of these files before you can use them: For file 1, "txt" is one of several common extensions used for text-only files, so file1 can most likely be read directly with a standard UNIX text editor. For file 2,"shar" is the file extension often used to denote a "shell archive." To process file2.shar, you usually can find directions at the top of the file like "Delete everything above the 'cut here' mark, and then type "sh this file." Chapter 4: Using FTP NorthWestNet User Services Internet Resource Guide 51 Finally, file 3 has two extensions: "tar" and "Z". First we would use the "uncompress" program, which will make a file called "file3.tar". We would then use then the "tar" program to unarchive the file into it component parts. Name of program *you* use to process this file on your computer's operating system Archive or Compression Program Name Added File Extension DOS Mac ARC BinHex compress PackIt PKZIP SHellARchive StuffIt tar uuencode ZOO ARC Hqx Z pit ZIP shar Sit tar uu ZOO arc602.exe xbin23.zip u16.zip UnPackIt pkz110eu.exe toadshr1.arc mactopc tar.zip toaduu20.zip zoo201.exe ArcMac BinHex MacCompress PackIt UnZip UnShar StuffIt UnTar uutool MacBooz Name of program *you* use to process this file on your computer's operating system Archive or Compression Program Name Added File Extension UNIX VM/CMS ARC BinHex compress ARC Hqx Z arc521 mcvert uncompress arcutil binhex compress pack PackIt PKZIP SHellARchive StuffIt tar uuencode ZOO z pit ZIP shar Sit tar uu ZOO unpack unpit unzip41 unshar unsit tar uudecode zoo201 arcutil zoo Chapter 4: Using FTP NorthWestNet User Services Internet Resource Guide 52 For More Information A comprehensive table of nearly 100 programs for unpacking archives and uncompressing files is maintained by David Lemson. His document also gives detailed information on where all listed programs can be obtained. Most of them are available via anonymous FTP. Here's the information for the location of the "master" copy, which should be up to date. FTP Host: directory: filename: ux1.cso.uiuc.edu doc/pcnet compression This file is available on other FTP hosts as well. USENET Discussion Groups The following USENET discussion groups deal specifically with the theory and practice of file compression. alt.comp.compression comp.compression Useful information about file compression is often presented in the following operating system specific groups as well. comp.binaries.amiga comp.binaries.apple2 comp.binaries.atari.st comp.binaries.ibm.pc comp.binaries.mac comp.binaries.os2 If you don't know how to use USENET, refer to Chapter 7 of NUSIRG, "Using USENET." Chapter 4: Using FTP NorthwestNet User Services Internet Resource Guide 53 Chapter 5: TELNET USING TELNET What is TELNET For? TELNET is an Internet application used for logging in to other Internet computers. With TELNET, you can access: o • o o Online databases Electronic library catalogs Internet information services Computers on which you have an account In practice, there are two kinds of TELNET. "Guest TELNET" allows you to login to a computer through a special guest account from which you can perform a restricted, but still useful set of tasks. "Full privilege TELNET" allows you to login to a computer on which you have a regular account, and to do your normal work on this computer from any other computer connected to the Internet. TELNET is one of the "application level services" of TCP/IP (Transmission Control Protocol / Internet Protocol) which computers throughout the Internet use to communicate. For more detailed information on the technical aspects of TELNET, obtain the references in the section entitled "For More Information." Note that when you access Internet services which are installed on IBM mainframes, you will sometimes need to use a special version of TELNET called "tn3270" which allows full screen TELNET sessions on IBM mainframes. From your perspective, tn3270 works just like TELNET, and you can simply substitute "tn3270" for TELNET. This is especially important when connecting to IBM mainframes from UNIX hosts. How Do You Use TELNET? If TELNET is installed on your computer, you can usually type "telnet", followed by another computer's Internet address. Sometimes you will also have to type in a userid or other login information. For example, to login to the University of Maryland's INFO program, you'd type: telnet info.umd.edu In a short time, the computer in Maryland should prompt you for a login id; just type "info" after the word "login:" login: info Chapter 5: TELNET NorthwestNet User Services Internet Resource Guide 54 You will then be asked what kind of terminal you are using. To take full advantage of this particular TELNET site, you should type 'vt100', or some other "full screen emulation" terminal type which allows you to use cursor keys, etc.) Throughout this session, you will see instructions on your screen about what to do. If you get confused in this or any other TELNET session, just type "help" or "?". Or, go to the section entitled "TELNET Troubleshooting" for solutions to some of the more commonly encountered problems. Here's a list of a few of the many TELNET sites on the Internet which offer valuable and interesting services. Enjoy! A Brief List of Some Representative TELNET Sites 1. TELNET Sites Which Work With Most Kinds of Terminals Name Internet Address Login Info Services CARL DDN NIC pac.carl.org nic.ddn.mil none needed none needed Knowbot Knowbot MELVYL sol.bucknell.edu 185 nri.reston.va.us 185 melvyl.ucop.edu none needed none needed none needed Library Catalogs Internet info, find computer addresses, etc. Find computer addresses Library Catalogs 2. TELNET Sites Which Work Best With "Full Screen Emulation" Name Internet Address Login Info Services PENpages psupen.psu.edu user: pnotpa SpaceLink 128.158.13.250 UMD INFO info.umd.edu user: newuser pass: newuser login: info Agricultural Information NASA & Space info. UNC INFO info.acs.unc.edu login: info Many kinds of information Univ. North Carolina info. The best way to learn about TELNET is to use it. There is a sample session to try at the end of this chapter. The rest of this document gives more detailed, but still nontechnical, information about TELNET. Additional Information for Personal Computer Users If you're connecting to the Internet from a personal computer, there are two main ways to use TELNET: o If you are a modem user, you can login to a mainframe or a telecommuncations provider using a terminal emulation program, and then use the mainframe or telecommunication provider's TELNET software. Chapter 5: TELNET NorthwestNet User Services Internet Resource Guide o 55 If you are using a personal computer connected directly to the Internet you may be able to use a TELNET program installed on your personal computer. Typical TELNET Sessions We'll illustrate the use of TELNET with two examples: 1) logging in to a VMS computer from a UNIX computer, and 2) logging into an Internet Information Service to a public TELNET account. In these sample sessions, lines are labeled as follows: U> Commands entered by you T> Responses from TELNET P> TELNET or operating system prompts where you type a response on the same line as the prompt; text you enter is underlined. Text with no line labels are explanations. Example 1. Using TELNET to Login to Another Computer on Which You Have an Account If you have computer accounts on two or more computers, substitute the names of those computers for the hypothetical Internet addresses supplied in this example. This example illustrates that you can usually get online help for TELNET within each of the operating systems, and help from the TELNET program while at the TELNET prompt. 1) In UNIX, you can type "man telnet" to get UNIX specific help on TELNET (in UNIX jargon, "man" is short for "manual page"): P> UNIXhost% man telnet Chapter 5: TELNET NorthwestNet User Services Internet Resource Guide 56 You will then see a page of the TELNET manual. TELNET(1C) DYNIX Programmer's Manual TELNET(1C) NAME TELNET - user interface to the TELNET protocol SYNOPSIS TELNET [ host [ port ] ] DESCRIPTION TELNET is used to communicate with another host using the TELNET protocol. If TELNET is invoked without arguments, it enters command mode,indicated by its prompt ("TELNET>"). In this mode, it accepts and executes the commands listed below. If it is invoked with arguments, it performs an open command (see below) with those arguments. Once a connection has been opened, TELNET enters an input mode. The input mode entered will be either "character at a time" or "line by line" depending on what the remote system supports. --More-- Now let's start a TELNET session by just typing TELNET. P> UNIXhost% telnet T> telnet> Chapter 5: TELNET NorthwestNet User Services Internet Resource Guide 57 We are now running the TELNET program on the UNIX host. Let's see what help the TELNET program has to offer (what you see might be different): P> telnet> help T> Commands may be abbreviated. Commands are: T> close T> display T> mode T> open T> quit T> send T> set T> status T> toggle T> z T> ? close current connection display operating parameters enter line-by-line or character-at-a-time mode connect to a site exit TELNET transmit special characters ('send ?' for more) set operating parameters ('set ?' for more) print status information toggle operating parameters ('toggle ?' for more) suspend TELNET print help information Notice that additional help can be obtained for some of the commands which have suboptions (e.g., "set ?"). Now let's open a session to another computer on which we have a regular account and password (substitute the name with a computer on which you actually have an account.): P> telnet> open vmshost.internet.computer.address T> Connected to vmshost.internet.computer.address T> Escape character is '^]'. From this point on, your terminal will display a session which is just like what it would be if you were logged in directly. T> Welcome to VMSHOST. Please log in. P> Username: your-userid P> Password: your-password T> Welcome to VMSHOST, running VAX/VMS V5.4-1. T> Last interactive login on Thursday, 2-SEP-1991 16:17 T> Last non-interactive login on Thursday, 2-SEP-1991 16:21 Chapter 5: TELNET NorthwestNet User Services Internet Resource Guide 58 Now that we are in the VMS machine, let's use the VMS help system to get information about TELNET on VMS. P> T> T> T> T> T> T> T> $ help telnet TELNET TELNET is a subsystem to allow users to connect their terminal to other systems on a network. TELNET supports communication using the TCP/IP, CHAOSnet and PUP protocols. Format: TELNET [host-name] T> Additional information available: T> Parameters Command_Qualifiers P> Press RETURN to continue ... <return key> P> TELNET Subtopic? <return key> P> Topic? <return key> We can close our connection to VMSHOST by logging out normally, and we will be returned to the UNIX session from which we had started: P> $ logout Unixhost% We've closed the connection to VMSHOST; if we wanted to we could enter more TELNET commands or start another session. But let's quit TELNET: P> telnet> quit UNIXhost% Example 2. TELNET Session to an Internet Information Server This example shows how TELNET can be used to access special guest accounts on Internet computers. The process of connecting to such guest accounts is the same: you type "telnet internet.host.address". But once you are connected, every site has different features and user interfaces, so don't expect the details of this example to represent anything but INFO at "info.umd.edu"! Chapter 5: TELNET NorthwestNet User Services Internet Resource Guide 59 U> telnet info.umd.edu T> Trying... T> Connected to dbserv.UMD.EDU. T> Escape character is '^]'. For this and most TELNET sessions, pressing the "Ctrl" or "Control" key followed by the "]" key will close your TELNET connection to another machine. ("^" is the standard abbreviation for the control key in most computer manuals.) You will now be prompted to log in as: T> Ultrix V4.1 (Rev. 52) T> At the "login:" prompt below, enter: T> INFO T> for access to the Information On-line files and programs. P> login: info T> Last login: Sat Sep 21 00:25:33 from annex2.umd.edu T> Ultrix V4.1(Rev 52)System #2: Tue Jan 15 11:01:34 EST 1991 T> UWS V4.1 (Rev. 197) You will now be prompted for your computer's "terminal type." When you use some TELNET services, you can ask for a display of what kinds of terminal emulation are supported at that site. T> Please enter your terminal type P> (? for a list, RETURN for 'vt100'): ? Terminal type does not mean "is you computer a Macintosh or an IBM mainframe?" but rather, "what kind of terminal can your computer 'emulate'." Any particular computer can, depending upon installed software, emulate one or more terminal types. Chapter 5: TELNET NorthwestNet User Services Internet Resource Guide 60 T> A list of supported terminals follows. Enter the type of your terminal (in lower case): T> type T> aaa T> dt80 T> h19 T> h29 T> kk T> T> T> T> T> T> T> T> T> m4 sun vt100 vt102 vt200 vt52 xterm z19 z29 description Ann Arbor Ambassador (24 lines) Datamedia DT80 Heathkit H-19 (also MD-PC/IP TELNET program for PCs) Heathkit H-29 Kermit VT-102 full-screen (for campus IBM mainframes e.g., DO IBM) Microterm (MIME) 340/314 in ACT-IV Mode Sun Microsystems Workstation Console DEC VT-100 (also NCSA TELNET program for PCs & Macs) DEC VT-102 DEC VT-200 DEC VT-52 X-windows vt100 terminal emulator (24 lines) Zenith Z-19 (like Heathkit H-19) Zenith Z-29 (like Heathkit H-29) If you're not sure what kind of emulation you have available, try "vt100", which is a kind of full screen emulation available on many computers. T> Please enter your terminal type P> (? for a list, RETURN for 'vt100'): vt100 Your terminal will now display the following introductory information about the Info system. Whenever online help is displayed, take the time to read it! View Return Select X-fer Go-To Protocol Quit INFO2.0 Welcome to INFO! MENU OPERATION: The menus will be available after you press a key to clear this screen. To select a menu item, press the arrow keys to highlight the item (such as VIEW or SELECT), and then press Return or Enter. You can also select a menu item by typing the first letter of that item. For example, pressing V selects the VIEW option. Help is available everywhere. If you get stuck you can press the ? key, and information about the highlighted menu item will appear on the screen. Press any key to continue... Chapter 5: TELNET NorthwestNet User Services Internet Resource Guide 61 When you press any key, you will see the main menu. VIEW Return Select X-fer Go-To Protocol Quit INFO 13 FILES IN / Name Description protocol = None 1 Computers Directory 11 Sep, 1991 15:17 2 EconData Directory 05 Jun, 1991 00:00 3 Literature Directory 18 Sep, 1991 10:41 4 Macintosh Directory 20 Sep, 1991 19:00 5 NewsLetters Directory 19 Aug, 1991 12:30 6 PC Directory 20 Sep, 1991 23:32 7 USGovt Directory 06 Aug, 1991 16:13 8 UofMaryland Directory 16 Sep, 1991 18:16 9 Weather Directory 30 Jul, 1991 10:12 10 World Directory 18 Sep,1991 15:13 11 info.cat File 20 Sep,1991 19:00 50866 bytes 12 update.cat File 20 Sep,1991 07:00 13110 bytes 13 welcome File 12 Sep, 1991 11:32 1782 bytes Use the up/down arrow keys to select a directory or file, press the first letter of a menu item to act on the selection. Press ? for help. Let's select USGovt. Since we're using vt100 emulation, we can press the down arrow on our keyboard until we get to item 7, and then press return to get to the USGovt menu. 10 FILES IN /USGovt Name Description protocol = None 1 2 3 4 5 6 7 8 .. (Previous) Directory 12 Sep, 1991 11:32 Bills Directory 05 Jun, 1991 00:00 Constitution Directory 01 Aug, 1991 10:56 Economics Directory 02 Aug, 1991 08:46 GAO Directory 06 Aug, 1991 17:23 SupremeCt Directory 23 Jul, 1991 16:34 Taxes Directory 05 Jun, 1991 00:00 educationFile 04 Jun, 1991 12:00 1927 bytes goals.txt 9 represenFile 25 Jul, 1991 11:26 16456 bytes tatives.txt 10 senators.txt File 25 Jul, 1991 11:26 4258 bytes Use the up/down arrow keys to select a directory or file, press the first letter of a menu item to act on the selection. Press ? for help. Again, move the cursor down to a line you want to select. Let's go to line 6 to the supreme court directory. VIEW Return Select X-fer Go-To Protocol Quit INFO Chapter 5: TELNET NorthwestNet User Services Internet Resource Guide 62 6 FILES IN /USGovt/SupremeCt Name Description protocol = None 1 .. (Previous) Directory 06 Aug, 1991 16:13 2 1989term Directory 23 Jul, 1991 16:33 3 1990term Directory 23 Jul, 1991 16:34 4 00index.cat File 23 Jul, 1991 16:33 12656 bytes 5 00readme.txt File 23 Jul, 1991 16:33 2692 bytes 6 justices.txt File 23 Jul, 1991 16:34 19299 bytes Use the up/down arrow keys to select a directory or file, press the first letter of a menu item to act on the selection. Press ? for help. Finally, we will view the document "justices.txt" by moving the cursor to line 6 and pressing the Return key. TOP Bottom Up Down /USGovt/SupremeCt/justices.txt Left Right Number Search Quit lines 1 - 17 of 314 JUDICIARY SUPREME COURT OF THE UNITED STATES One First Street NE, 20543. Phone, (202) 479-3000 WILLIAM HUBBS REHNQUIST, Chief Justice of the United States, born in Milwaukee, WI, October 1, 1924; son of William Benjamin and Margery Peck Rehnquist; married to Natalie Cornell of San Diego, CA; children: James, Janet, and Nancy, member of Emmanuel Lutheran Church, Bethesda, MD, served in the U.S. Army Air Corps in this country and overseas from 1943-46, discharged with the rank of sergeant, Stanford University, B.A., M.A., 1948; Harvard University, M.A., 1950; Stanford University, LL.B., 1952 ranking first in class; Order of the Coif; member of the Board of Editors of the Stanford Law Review; law clerk for Justice Robert H. Jackson, Supreme Court of the United (more text) Use the up/down arrow keys to select a directory or file, press the first letter of a menu item to act on the selection. Press ? for help. To exit "info.umd.edu" you can press "Ctrl ]". You will see T> telnet> on your screen. You can either enter "open another.internet.computer.address", or "close", to terminate your TELNET session. Chapter 5: TELNET NorthwestNet User Services Internet Resource Guide 63 TELNET TROUBLE-SHOOTING Step 1. If just typing "telnet" doesn't give you the "TELNET>" prompt: o Try typing "help telnet", "man telnet", "info telnet" or whatever command is appropriate to your operating system. You might also try "tcpip" instead of "telnet", o or contact your local user services personnel. Step 2. If you type "telnet an.internet.computer.address" and you don't get connected: o "unknown host" message: You might have misspelled the computer's domain name, or the domain name of the computer might have changed. o "foreign host did not responding within OPEN timeout" message: There's probably too much traffic somewhere on the Internet between you and the host, or the host is disabled in some way. Try again later. o There might be a limit on the number of users allowed onto the host at a given time. You will usually get some sort of explanation from the host to this effect. Try again later. Step 3. When logging in to a VM/CMS mainframe from a UNIX host, TELNET will only give you "line-at-atime" service. You should use a 3270 emulator for full screen service. WHAT RESOURCES CAN BE ACCESSED WITH TELNET? There are many very interesting and valuables services listed in several chapters of NUSIRG and in the documents referenced in these chapters: Chapter 6: Archie: The FTP Guru Chapter 11: Accessing Library Catalogs Through the Internet Chapter 12: Internet Accessible Databases and Bibliographies Chapter 13: The Wide Area Information Server (WAIS) Chapter 14: Internet Directory Services FOR MORE INFORMATION ON TELNET Technical Descriptions of the TELNET protocol Douglas E. Comer. 1991. "Internetworking with TCP/IP." Vol. 1. Prentice-Hall, Inc. Chapter 22: Applications: Remote Login (TELNET, RLOGIN), contains a relatively accessible discussion of the technical aspects of TELNET. Chapter 5: TELNET NorthwestNet User Services Internet Resource Guide 64 Authoritative sources for technical information about TELNET (and most anything else about the Internet) can be found in "RFC" (Request for Comments) documents. Here's a partial list of relevant RFC's on TELNET: RFC 854: "TELNET Protocol Specification" RFC 764: "TELNET Protocol Specification" RFC 855: "TELNET Option Specifications" RFC 856 - RFC 861: Many other TELNET options specifications Although RFC's are available from many other sources on the Internet, here are instructions on how to obtain RFC's from two definitive RFC repositories: 1. Via FTP: FTP Hosts: directory: files: nis.nsf.net rfc rfcxxx.txt (where xxx is the RFC number) 2. Via electronic mail messages to nic.ddn.mil's automated "mail server": mail subject: [email protected] rfc xxx Information On TCP/IP Packages for PCs Which Include TELNET "Network Protocol Implementations and Vendors Guide" is a 300+ page description of TCP/IP hardware and software available at no charge via FTP and electronic mail, or for purchase by land mail: FTP Host: directory: file: nic.ddn.mil netinfo vendors-guide.doc e-mail: subject: mail [email protected] (none needed) mail: DDN Network Information Center, SRI International 333 Ravenswood Avenue, Room EJ291 Menlo Park, CA 94025 ($45 if ordered by postal mail.) Chapter 5: TELNET NorthwestNet User Services Internet Resource Guide 65 Chapter 6: "Archie": The FTP Archive Guru WHAT IS ARCHIE? Archie is a computer program which maintains a constantly updated catalog of the contents of a large proportion of the world's anonymous FTP archives. Archie is rapidly becoming one of the more useful computer resources on the Internet. It's well worth your time to learn how to use it. WHAT IS ARCHIE USED FOR? There are thousands of computers on the Internet which offer anonymous FTP services. Once you know how to use FTP, you are faced with some challenging tasks. How do you find out which FTP site has the file you're looking for? For that matter, how can you find out which FTP site has the most up-to-date version of whatever file you're looking for? To keep track of the contents of these services before Archie, you either had to be an FTP archive guru who stayed awake all night prowling through the Internet, or else be lucky enough to know one. Archie is an FTP guru for everyone on the Internet. Archie is ready and able to answer your questions. HOW DOES ARCHIE DO IT?! There are two major parts of the Archie program: o o The first part of the Archie program is responsible for monitoring the contents of FTP archive sites. Each month, the Archie program: o does an anonymous FTP to all sites contained in its master list of sites, o requests a directory listing of their contents, and o updates master catalogs of the holdings of all FTP sites. The second part of the Archie program (the part you'll use) allows you to search through the master list of FTP files, just like you might use a library catalog to find a book on a particular topic. Archie's output includes the Internet domain name of the FTP host, the directory in which a file is located, the size of the file in bytes, and the date on which the file was placed in that FTP host. Once you've gotten this list of possible sources from Archie, you FTP to a site which has what you need, go to the subdirectory in which Archie says the file is located, and copy the file to your own computer. WHAT KINDS OF QUESTIONS CAN ARCHIE ANSWER? Archie can currently answer two kinds of questions: Chapter 6: "Archie": The FTP Guru NorthwestNet User Services Internet Resource Guide 66 o Is there a file containing a particular set of characters in its filename on an FTP host somewhere? In the rest of this chapter, this will be referred to as a FILENAME SEARCH. o Is there a file dealing with a certain subject which has been cataloged by subject? You can search the "PD (or Public Domain) Software Description Database," which contains descriptive information about the actual contents of a small subset of the files known to Archie. This will be called a FILE CONTENTS SEARCH. It's incredibly useful that Archie is set up to perform file contents searches. You'd be amazed at the obscurity of the filenames which some people give their programs or files. Just as a hypothetical example, you might think that a "Computer Aided Design" program would have the letters "CAD" somewhere it it's name; but more often than you'd like, a CAD program might have a name like "TLZWYQXP.DTU". In such a case, you just have to hope that the author(s) of this program had the foresight to send a message to the Archie folks saying that "TLZWWQXP" was a CAD program. To get you started, try one of the following sample sessions with Archie in which you'll search for files containing information about NorthWestNet, using both FILENAME and FILE CONTENTS searches. Once you've gone through one of these examples, you'll have the skills you need to go ahead and use Archie for whatever kind of search you might want to make. HOW DO YOU USE ARCHIE? Archie Syntax The basic search command of Archie is "prog". Entering the command string prog textstring will find all files that contain the word "textstring" in their filenames. A full explanation of Archie syntax can be gotten with the "help" command in either of the two access methods described below. Archie By E-Mail You can use Archie by e-mail. First time users should request a help file with the following message: mail: subject: [email protected] help If you are accessing Archie by mail, you can put Archie search requests, one per line, in the body of your message (Archie will also read requests placed in the subject line). For example, entering the following command string mail: [email protected] subject: (none needed) prog gateways Chapter 6: "Archie": The FTP Guru NorthwestNet User Services Internet Resource Guide 67 prog nwnet will search for files containing the words "gateways" or "nwnet" in their filenames. Note that a subject is not needed. Archie By TELNET Here are the steps for accessing Archie over the Internet: Step 1. Use TELNET to access a remote Archie server. If you don't have access to TELNET or if you're not sure how to use TELNET, be sure to read Chapter 5 of NUSIRG, or ask your instructor or you local user services staff for help. However, if you do wish to use TELNET to access Archie, here are the domain name addresses of the computers which support public access to Archie. o If you're in North or South America, TELNET to the Archie host nearest you: archie.ans.net archie.mcgill.ca archie.rutgers.edu archie.sura.net archie.unl.edu o If you're in Eurasia or Africa, TELNET to either: archie.doc.ic.ac.uk or nic.funet.fi o (New York, USA) (Montreal, Canada) (New Jersey, USA) (Maryland, USA) (Nebraska, USA) (United Kingdom) (Finland) If you're in Australia, New Zealand or Oceania, TELNET to: archie.au (Australia) Step 2. Use the login name "archie". No password is required. You should see a short help screen giving some basic help explaining how to use the system. You may also see information about recent changes to Archie. You can get additional help about Archie at any time during your session. Typing help will give you a list of currently valid commands. To obtain help on a particular command from the displayed list, just type help and the command-name. For example, to get help on the "prog" command, type help prog Step 3. Now you're ready to do a FILENAME SEARCH for all documents in the Archie file catalog for any document containing the text string "nwnet" in its filename, regardless of whether the filename is upper case, lower case, or any mixture of upper and lower case. All you need to do is to type: prog nwnet While Archie is searching, it will display the percentage of filename databases it has searched, and the number of occurrences of the string "nwnet" it has found. Chapter 6: "Archie": The FTP Guru NorthwestNet User Services Internet Resource Guide 68 If a search seems to be taking a very long time, or resulting in hundreds of possibly spurious "hits," or positive locations of the character string, you can stop Archie by pressing "control c" (press the "control" key - sometimes labelled "ctrl" and the "c" key simultaneously). Step 4. When Archie is done searching, it will display: o o o the files whose names contain the string "nwnet" in which FTP hosts these files can be found and the subdirectory path in which they are located. Step 5. If you want to e-mail a copy of the results of this search back to your own Internet user-id, just type mail [email protected] This means that you can look at the results of your searches at your leisure. This is an especially good idea since it means you can logout of Archie as soon as you're done. This will make a connection available for another person to login to Archie. Remember, Archie, like most Internet resources, has a limited number of users it can serve at once! The more quickly AND efficiently you use it, the more other people can use it. Step 6. Now try a quick FILE CONTENTS SEARCH. Just type: whatis nwnet All lines in the "PD Software Description Database" which contain the string "nwnet" will be displayed. Again, you can use the command mail [email protected] to have the results of this search sent back to your account. Step 7. To end your Archie session, simply type quit Step 8. Any search results you mailed back to your userid should be sent to you as incoming mail within a few minutes. THINGS TO KEEP IN MIND BEFORE YOU USE ARCHIE Archie currently keeps track of more than 800 FTP hosts, containing more than 1,000,000 files. If you're not careful, you could easily generate thousands of "hits" that are not really meaningful answers to your inquiry. For example, "prog doc" would not be a very useful search request. Think about your search very carefully before you TELNET to Archie. Learn to take full advantage of the many search options described in the Archie manual to restrict your search. There are many more features to Archie than can be described in this brief introduction. So, before you use Archie for real searches, be sure to use the "help" command, and to read the most current Archie documentation. Anything written about Archie (or any other Internet resource) may be out-of-date a few days after it is written. When you TELNET to Archie, and before you start your search, read the news messages that appear on your Chapter 6: "Archie": The FTP Guru NorthwestNet User Services Internet Resource Guide 69 screen. The developers of Archie may have just made some major breakthrough in their program which will make using it even easier to use, but hasn't even been written up in the Archie manual. Best of all, Archie (and most other Internet resources), will change in response to your suggestions. Once you've used Archie, the developers of Archie would appreciate your feedback and comments to make Archie even more useful. Send comments, bug reports, contributions to the database file, reports of anonymous FTP sites that Archie doesn't seem to maintain (or even much deserved notes of appreciation) to: [email protected] The Archie program was written and is maintained by: Alan Emtage ([email protected]) Bill Heelan ([email protected]) Ideas and inspiration were (and still are!) provided by Peter Deutsch ([email protected]) FOR MORE INFORMATION ABOUT ARCHIE The best source of up-to-date information about Archie are the login messages you see when you login to Archie. For updates, and new features, and files in the FTP host maintained by Archie's developers, access the following resources FTP host: directory: filename: quiche.cs.mcgill.ca archie/doc whatis.archie (brief overview archie.man.txt (ASCII archie manual Chapter 6: "Archie": The FTP Guru NorthWestNet User Services Internet Resource Guide 70 SECTION 3: COMMUNICATING WITH PEOPLE Chapter 7: Using USENET .................................................................................................... 71 What is USENET? ................................................................................................... 71 USENET Also Contains Local Groups ..................................................................... 73 A Quick Overview of Using USENET ..................................................................... 74 For More Information About USENET .................................................................... 83 Addendum 1: USENET Newsreading Software Packages And Source Info .............. 84 Chapter 8: LISTSERV Discussion Lists................................................................................. 87 What Is LISTSERV?................................................................................................ 87 What Is A LISTSERV Discussion List? ................................................................... 87 What Is A LISTSERVer? ......................................................................................... 87 How Does LISTSERV Work? .................................................................................. 87 A Short Summary of How To Use LISTSERV From The Internet............................ 88 A Summary Of Basic LISTSERV Commands .......................................................... 89 What Everyone Should Know Before Using LISTSERV.......................................... 90 For More Information About LISTSERV ................................................................. 91 USENET AND LISTSERV If you have an apple and I have an apple and we exchange these apples then you and I will still each have one apple. But if you have an idea and I have an idea and we exchange these ideas, then each of us will have two ideas. George Bernard Shaw This section introduces you to two of the most widely used forums for communication between people on the Internet: USENET discussion groups and BITNET LISTSERV Lists. Both USENET and LISTSERV groups are organized by topics, so you can find a group whose topic interests you and immediately "meet" people around the world who are communicating about your interests. These services are like the cafes, village greens, and other meeting places in a global community filled with people sharing ideas, news, opinions, and just plain conversation. Feel free to join in! Section 3: Communicating with People NorthWestNet User Services Internet Resource Guide 71 Chapter 7: Using USENET WHAT IS USENET? USENET is a service of the Internet which allows you to participate in discussions on many different topics with people throughout the world. More specifically, USENET is: ❏ ❏ a collection of hundreds of "newsgroups" covering everything from supercomputer design to bungee cord jumping; a forum for discussions, questions and answers, and news. USENET is used daily by many thousands of people on computers worldwide. USENET is also a systems which evolves in response to its user's needs. Every month, new USENET groups are created in response to the votes of USENET users. And most importantly, if you use it well, USENET can be highly educational - and highly entertaining. What Are USENET Newsgroups? USENET discussion takes place in hundreds of USENET newsgroups, each dealing with a particular topic. The term "USENET newsgroups" might suggest that USENET is mainly concerned with "news," but USENET newsgroups (or "groups") are also forums for information, discussions, debates, questions, and answers. Each USENET group is comprised of articles (or "postings") which are submitted (or "posted") by users from throughout the world. For those of you already familiar with electronic bulletin boards, USENET groups are very similar to bulletin board rooms, special interest groups, conference rooms, and so forth. How Are USENET Articles Distributed Through the Internet? The basic purpose of USENET is similar to that of LISTSERVers described in Chapter 8: to allow people with shared interests to communicate quickly and easily. However, information is distributed very differently by the two systems. Every person subscribed to a LISTSERV group receives a copy of every file sent to the group. Because you have to handle every LISTSERV file individually as it is sent to you, the number of LISTSERV groups to which you can subscribe is limited. In USENET, each subscribing Internet site receives as single copy of each article via a "USENET news feed." These news feeds are handled by Internet software called Network News Transfer Protocol or NNTP. The tens of thousands of USENET files which accumulate each week are stored on one mainframe, workstation, or personal computer at your site. Even if there are 1,000 people want to read a given article, only one copy needs to be stored. This system is much more resource efficient than 1,000 individual copies. An even more efficient method of distributing USENET articles has been developed which allows a single NNTP news feed machine to be accessed by many other computers. This new method is of special interest to sites with limited computer resources, such as an elementary school with a few personal computers and modems. You don't Chapter 7: Using USENET NorthWestNet User Services Internet Resource Guide 72 have to have a machine at your site to store the tens of thousands of USENET articles you might not want to read. Only articles you are interested in are displayed on your screen from the remote NNTP server. How Are USENET Newsgroups Organized? Each USENET newsgroup has a distinct name which describes the discussion carried out in the group. Here are the names of a few of the many hundreds of USENET newsgroup names to give you a sense both of the diversity of topics, and how USENET groups names are put together: alt.usage.english bionet.agroforestry bionet.software bit.listserv.history bit.listserv.travel-l biz.comp.services biz.dec.workstations comp.sources.apple2 comp.unix.questions k12.chat.elementary k12.lang.francais misc.jobs.offered misc.rural news.announce.newusers news.newusers.questions pnw.forsale rec.arts.books rec.food.recipes sci.archaeology sci.math soc.college.gradinfo soc.culture.nordic talk.politics.guns talk.rumors uw.general uw.jobs All USENET newsgroup names are made up of abbreviations separated by periods, arranged in a hierarchical fashion. The first part of the name is a major category, and the second (and sometimes third, fourth, or even fifth) part(s) give increasingly more detail about the topic covered by the group. For example, "k12.chat.elementary" is a group in the hierarchy created for kindergarten through 12th grade users (k12) oriented towards casual discussion (or chat) among elementary school students. There are only a few first level categories, within which may be hundreds of specific newsgroups. Here's a list of the general topics covered by the some of the most commonly encountered main level categories: alt bionet bit.listserv biz comp k12 misc news rec sci soc talk pnw & uw a hierarchy for tentative or controversial groups; not carried by all USENET sites a hierarchy for biology oriented groups, primarily intended for research biologists LISTSERV groups distributed to USENET Business / corporate oriented discussion Computer oriented groups Kindergarten through high school groups Groups not easily fit into other categories Groups devoted to news about USENET Recreation or hobby oriented groups Science oriented groups Groups oriented to discussion of particular cultures or social groups around the world Groups for free form discussions which often focus on controversial topics (e.g., abortion, nuclear energy) examples of regional USENET hierarchies which will be Chapter 7: Using USENET NorthWestNet User Services Internet Resource Guide 73 explained in more detail below Consider five hypothetical groups dealing with politics in the United States, each in a different main level hierarchy: biz.us.politics k12.us.politics sci.poli-sci.us soc.us.politics talk.us.politics The articles within each of these U.S. politics groups are likely to have very different emphases, which helps to serve the diversity of USENET readers. USENET ALSO CONTAINS LOCAL GROUPS Although most of USENET is a global community, it is also set up to address the needs and interests of users in local areas. As mentioned above, "pnw" and "uw" are examples of "regional hierarchies." These hierarchies contain groups of interest to users in the Pacific Northwest region of the United States, and to the University of Washington, respectively. Such regional hierarchies have been set up for many other parts of the world for discussions of local interest. Here are some examples of other regional hierarchies to give you an idea of how this system works: Institutions Cities States or provinces Regions Countries Continents uw yale pdx tor ab or pnw ne fnet nz eunet na Univ. of Washington Yale University Portland Toronto Alberta Oregon Pacific Northwest New England France New Zealand Europe North America Regional newsgroups usually deal with topics that probably wouldn't interest users elsewhere in the world, such as where Yale's MacIntosh Users Group will meet next week, or why zucchini has suddenly become so expensive in Alberta. So don't feel like you're missing much, there are hundreds of globally distributed newsgroups to keep you busy. Chapter 7: Using USENET NorthWestNet User Services Internet Resource Guide 74 A QUICK OVERVIEW OF USING USENET What You Should NOT Do On USENET Although USENET probably would be best described as a quasi-democratic anarchy, there are a few explicitly forbidden activities: ❏ Do Not Violate Copyright Or Any Other US or International Laws. Feel free to reproduce short extracts of a copyrighted work for critical purposes in your postings, but reproduction of copyrighted works in whole or substantial part is forbidden by US and international copyright law. Respect the hard work of copyrighted authors. Similarly, engaging in or communicating about illegal activities on USENET is forbidden, and could endanger you and your site's USENET feed. ❏ USENET Is Not For Commercial Communication. This does not mean that you can't discuss commercial products on USENET. In fact, objective descriptions and comparisons of commercial computer products is a very useful USENET activity. But, if you represent a company, don't even think of posting commercial advertisements on USENET. At the very least, you will probably be flooded by complaints from outraged USENET users, and at the worst, your company's USENET feed could be endangered. Getting Started With USENET To read USENET articles, you use "newsreader software." So, the first thing you need to do before getting started with USENET is to: Find out if you have newsreader software on your computer As you can see in addendum 1, there are many newsreader packages for both mainframes and personal computers. If you already know the name of your newsreader software, skip ahead to "A Typical USENET session." If you're not sure of the name or even the existence of newsreader software on your computer, you should ask your local users services staff or instructor for help. Or, if you're inquisitive, and like to do things on your own, try the following steps. ❏ If you're using a mainframe computer connected to the Internet, try using your local help system (e.g., "help" or "man") to determine if one of the newsreading software packages listed in addendum 1 is installed on your system. For example, on a VMS system, you might try "help vnews" or on a UNIX machine try "man k news". ❏ If you are working from a personal computer such as a Mac or an IBM PC, you might have a PCbased news reader installed which accesses USENET through a modem. Again, try the "help" or "find" command appropriate to your computer. ❏ If you can't find one of the programs listed in addendum 1, one of them might be installed under a different name on your computer or you might have a newsreader we haven't listed. But, most probably, a USENET newsreader is not yet installed on your system. If so, the person administering you machine might be willing and able to install newsreading software. Chapter 7: Using USENET NorthWestNet User Services Internet Resource Guide 75 A typical USENET session Regardless of which newsreading software you use, a typical USENET session usually involves the following steps: Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Step 10 Start the newsreader software. Select a newsgroup. Scan the titles of articles in that newsgroup. Read, save or print articles you find particularly interesting. Send e-mail to another USENET user. Post an article to the newsgroup. Clear all remaining articles in the newsgroup so they won't appear in your next USENET session. Select another newsgroup. Repeat steps 3 through 8 as desired. End your USENET session. Even though it's not possible to explain how to use all of the newsreaders listed in addendum 1, a quick example using one of the more commonly encountered newsreaders on UNIX machines ("rn"), is given later in this chapter to illustrate what going through these steps is actually like. Newsgroups ALL New USENET Users Should Read When you first start using USENET, you should read the following two newsgroups to learn the ropes of the USENET world. The first is: news.announce.newusers This newsgroup contains informative articles which are posted every month to help explain the workings of USENET. Another very useful introductory newsgroup is: news.newusers.questions As the name suggests, this is a question and answer forum for new USENET users. If you read this group for several months, most basic questions you have about USENET that are not answered by this document will be asked by new users and answered by USENET experts. If you want to keep abreast of changes and announcements about USENET, you should also read two additional newsgroups. The discussion group: news.announce.important contains announcements about USENET which are likely to be of interest to all USENET users. This group is *not* for political, commercial, or other non-USENET related announcements, no matter how important. Another generally useful and informative group is: news.announce.newsgroups which is for announcements of the creation of new USENET newsgroups. Chapter 7: Using USENET NorthWestNet User Services Internet Resource Guide 76 Finding Specialized Newsgroups To Which You Want To Subscribe There are two basic strategies you can use to find newsgroups with most USENET software: ❏ List all group's names and select groups you want to read. This is a good strategy if you are just starting to use USENET, and you're not yet sure what's available, or how newsgroups are named. Although this is done automatically by some newsreaders, in other cases, you have to explicitly ask for a complete list of available groups. You may then subscribe to groups whose names interested you. ❏ Use the newsgroup software to search group's names for keywords. Search through the group's names for a particular word which you think might be in the names of groups you'd like to read. For example, using "rn", one could search for all the newsgroups whose names contained the word "mac", using the "/" command followed by the word "mac", in order to identify newsgroups dealing with Apple Macintosh Computers ("user>" precedes commands you should type; "rn>" indicates responses from the rn newsreader.) user> /mac rn> rn> rn> rn> rn> rn> rn> rn> bit.mailserv.word-mac comp.binaries.mac comp.emacs comp.lang.forth.mac comp.os.mach comp.sources.mac comp.sys.mac comp.sys.mac.announce ... (many more "comp.sys.mac" groups) rn> gnu.emacs.announce ... (many more "gnu.emacs" groups) If you use this method to search for newsgroups, try to use the shortest likely abbreviation for a topic (like "bio" instead of "biology"), and/or scan the master list of USENET groups to get an idea what a likely abbreviation might be. However, some abbreviations may be redundant and refer to two or even multiple discussions groups. In this example, the word "mac" is also contained in newsgroup names which have nothing to do with Macintosh computers, like "comp.os.mach," and "gnu.emacs.bug." Helpful Strategies For Reading Newsgroups Your First USENET Session As was mentioned in the introduction, each USENET site may subscribe to hundreds of groups which together may contain tens of thousands of articles. Unfortunately, many newsreaders overwhelm the first-time user by presenting every newsgroup, one by one. This approach is like teaching someone to find books in a library by presenting each book in the library in order, and asking, "Is this the book you want? No? Is the next book on the shelf what you want?" Chapter 7: Using USENET NorthWestNet User Services Internet Resource Guide 77 There are a number of steps you can take to make your introduction to USENET encouraging, not intimidating. Most importantly: Start simple. Don't try to read everything. Be selective. First, issue your newsreader's command which gives the names of all groups available at your site in a list format. You can then start exploring USENET by subscribing to one or a small number of groups that look really interesting to you. Try reading a few articles to get an idea what the discussion in the newsgroup is like. This will allow you to become familiar with your newsreader software, and will give you a flavor of USENET discussion. In highly active groups, there may be a backlog of hundreds of articles which you may not have time to read. Most newsreader software include commands which will erase backlogged articles. Usually a command such as "catch-up", "clear", or "mark all read," will leave you with a clean and manageably small slate. Once you've started reading one or more newsgroups that interest you, there are a number of things you can do to make the most out of your time with USENET. Read Periodic Postings and Frequently Asked Questions (FAQs) Many USENET groups contain "periodic postings" which contain useful information for the new and intermediate readers of these newsgroup(s). Such postings usually appear once a month. Periodic postings include: ❏ Articles explaining USENET etiquette. ❏ Frequently Asked Questions (FAQs); these are questions which newcomers to a particular newsgroup often ask, and which are better answered in periodic postings than in repeated individual answers. ❏ Things to keep in mind before posting articles to that particular newsgroup. ❏ Suggestions about where to find commonly needed information about the Internet generally, or USENET specifically. You'll get a lot more out of USENET if you make a point of reading the periodic postings of the newsgroups to which you subscribe. You can also read periodic postings by using FTP to retrieve copies from an archive of FAQs stored on a computer with the Internet address "pit-manager.mit.edu". The files are stored in the directory "/pub/usenet". Each subdirectory within this directory has the name of a newsgroup name, each of which contains the periodic postings. Here's an example of the full file name and path of such a FAQ: /pub/usenet/news.announce.newusers/Answers_to_Frequently_Asked_Questions If you do not have access to FTP, you can also access the archive via electronic mail. The address of the server is [email protected]. The names are the same, with the "/pub/" chopped off. To retrieve the file mentioned above, you would send mail to the mail-server with the text of your message containing only: send usenet/news.announce.newusers/Answers_to_Frequently_Asked_Questions Chapter 7: Using USENET NorthWestNet User Services Internet Resource Guide 78 You can also use the send command in e-mail messages to obtain help about how to use this mail server. For example, the request strings: send help send index send usenet/index send usenet/news.announce.newusers/index will solicit help and index information. Following "threads" of discussion Even when you are reading a discussion group in a very specialized subject, you will often find that there may be only a subset of articles you want to take the time to read. Most newsreaders support an automated process for following threads of discussion. Articles which are on the same topic can be located either by scanning the subjects, the articles, or even the contents of the articles. Clearing news you don't want to read Newsreaders also allow you to automatically erase articles on topics you don't want to read. You can also erase all articles by USENET users whose postings you have found out you don't want to read. In some cases, you can set up a "kill" file, which will clear unwanted articles for you every time you use your newsreader. What You Should Know BEFORE You Make Your Own Postings All of the suggestions in the e-mail etiquette section of NUSIRG apply to USENET. The document called "A Primer on How to Work With the USENET Community," as discussed later in the "FTP Archives of USENET Information" section, is a useful resource for the novice USENET reader. You are strongly encouraged to review these documents before you become an active part of the USENET Community. The most important thing to keep in mind when sending messages to USENET is that your message may be sent to tens of thousands of machines, and read by hundreds of thousands of people. This translates to a significant quantity of computer resources, and a substantial number of accumulated person hours. All of the specific suggestions below follow from this simple fact. ❏ Try not to post until you've become familiar with the workings of USENET. Making a premature posting to USENET is the best way known to embarrass yourself (and your organization) in front of tens of thousands of people at the stroke of a single key! ❏ No matter what you're posting, be sure you are sending your message to the appropriate newsgroup, and that you have specified an appropriate "distribution." Check through your local master list of newsgroups before posting. Sometimes, it may be useful to specify more than one newsgroup. This multiple posting activity is known as "crossposting," but try not to crosspost unless absolutely necessary. Distribution refers to how widely your posting is propagated. For example, distributions available at the University of Washington include "world," "na" for North America, "pnw" for the pacific northwest, "seattle," and "uw" for the University of Washington. If your posting is only of local interest, only post it locally. For more information, read the FAQ article "Frequently Submitted Items" in news.announce.newusers. ❏ If you are responding to someone else's posting, it is often more appropriate to reply directly to that person with and e-mail message. Use your newsreader's command that sends mail *directly* to that Chapter 7: Using USENET NorthWestNet User Services Internet Resource Guide 79 user, and not to the newsgroup. If your newsreader doesn't have such a feature, identify the person's user-id and e-mail address on the "from" line of their message or in the information at the end of their posting. You can then use your computer's mail software to send them a message. ❏ If you are posting a response to someone else's posting, include enough of their posting in yours to provide a context for your response. Most newsreaders and e-mail programs provide a feature to do this easily. However, try to avoid including more of their posting than is necessary to get their point across. ❏ Sometimes a message to which you are responding has been crossposted, inappropriately, to many newsgroups. If you respond to such a message, trim down the list of crossposted newsgroups in your response to those you feel are most appropriate. ❏ Before you post a question, try your local resources including reference books and manuals, local User Service staff, and friends. If your question might be a "Frequently Asked Question," check either news.newusers.questions or the newsgroup's FAQ posting, if available. ❏ If you want to send an answer to a question, scan the rest of the submitted articles in the newsgroup before sending mail or posting. You will often find that one question may elicit an unnecessarily large number of duplicate answers in a few hours or days. Of course, if your answer is different, and/or if you are sure that the other answers offered are definitely wrong, you should go ahead and respond. ❏ Some newsgroups are "moderated," which means that there is a person who screens potential postings before they are put into the newsgroup. To post to moderated newsgroups, send e-mail directly to the moderator's user-id and computer. Here are some examples of moderated newsgroups. Newsgroup Name Moderator Moderator's Address news.announce.newsgroups David Lawrence [email protected] news.announce.important Mark Horton [email protected] news.announce.conferences Dennis Page [email protected] What To Do If Something Goes Wrong Here are three common problem areas you may encounter when using USENET: you might make a mistake, someone else might submit rude or insulting postings, or newsreader software might mess up distribution of USENET articles. Here's what to do in each case. ❏ Suppose you've submitted a posting, but suddenly realized that you didn't want to for one reason or another. "Oh no, I've sent my question about Nepali culture to rec.sport.football by mistake!"; or "Wait a second, what I said about x is wrong!" Luckily, most newsreaders allow you to cancel a submission. Make sure you know what your newsreader's command for this is before you post. Your submission might still get to a few sites, but you can usually squelch a mistaken submission if you act quickly. In general, it's not a good idea to post a second message retracting or apologizing for a posting unless you sincerely feel you've made a grievous mistake. ❏ If someone posts something that obviously violates USENET etiquette, it's usually best not to get involved. There are plenty of USENET old-timers that can usually deal with the situation in a Chapter 7: Using USENET NorthWestNet User Services Internet Resource Guide 80 sagacious way. Unfortunately, there are also a few hot-headed individuals who sometimes turn such situations into "flame-wars," which is USENET slang for a rude, disputatious, and inappropriate argument which shouldn't be carried out in a newsgroup. Always resist the temptation to get involved in or start flame wars; there are no winners. And, in the very unlikely event that someone attacks you personally in a posting, simply ignore it; they'll usually stop. Even the most obnoxious "flamers" will usually desist when they feel that no one is paying attention. And if you keep your peace, it will be apparent to anyone reading such a posting that it is the flamer, and not you, who is of dubious character. ❏ If you have reason to think that your local newsreader or your USENET feed is malfunctioning, find out who is responsible for maintaining USENET at your site. Unless you are a USENET administrator you shouldn't post messages about local problems. Although this may seem to have been an inordinately long introduction to a single Internet resource, USENET is an unusually rich resource. In fact, apart from e-mail, USENET is probably the most frequently Internet resource used by the bulk of Internet users. FTP Archives of USENET Information Archives of Information About USENET This is a list of monthly articles posted to news.announce.newusers which provide considerably more detail on the introductory USENET topics covered in this brief overview. Introduction to news.announce.newusers Rules for posting to USENET What is USENET? A Primer on How to Work With the USENET Community Answers to Frequently Asked Questions USENET Software: History and Sources Emily Postnews Answers Your Questions on Netiquette Hints on writing style for USENET List of Active Newsgroups Alternative Newsgroup Hierarchies Regional Newsgroup Hierarchies List of Moderators Publicly Accessible Mailing Lists, Parts I-III List of Periodic Informational Postings How to Create a New Newsgroup How to Get Information about Networks How to Create a New Trial Newsgroup A Guide to Social Newsgroups and Mailing Lists If you already have access to USENET, go to the introductory "newsgroup news.announce.newusers" to read them. If you do not yet have access to USENET, but do have access to the Internet, these files are available via anonymous FTP from the FTP host: pit-manager.mit.edu in the directory Chapter 7: Using USENET NorthWestNet User Services Internet Resource Guide 81 pub/usenet/news.announce.newusers Each of the files has the same name as in the list above, with spaces filled by the underscore character. For example, the article entitled "List of Moderators" above is stored in pit-manager.mit.edu as: pub/usenet/news.announce.newusers/List_of_Moderators Archives of Other Past USENET Articles Finally, the articles submitted to most active USENET discussion groups have been archived at various locations around the world. Although there is no single repository, there are a number of large archives which you should investigate if you want to find either old USENET discussions or USENET discussion groups which your site does not receive. Some of the larger collections of archived newsgroups can be found at the following FTP sites: pit-manager.mit.edu wuarchive.wustl.edu uunet.uu.net If you are looking for archives of a group which is not contained in these sites, you can use the Archie program (described in Chapter 6) to search for an FTP site containing the name of the newsgroup whose archive you are seeking. A Typical USENET Session (With the Newsreader "rn") Even if you don't use "rn", the following example should give you a feeling for what a typical USENET session involves. This is meant to capture the spirit, not the details, of using USENET. Commands you would type are preceded by "user>" to indicate that you should type the command which follows. Responses from the newsreader software appear after "rn>". These will not appear in an actual rn session. Step 1. To Start the newsreading software, simply type user> rn Most newsreaders will respond with a series of informative messages, and a list of a few basic commands including how to get on-line help. rn> Trying to set up a ".newsrc" file--running newsetup... rn> Creating .newsrc in /u2/user-id. rn> Done. rn> To unsubscribe to groups use the "u" command. rn> To list groups you can subscribe to use the "l" command. rn> To subscribe to a newsgroup use the "g" command. rn> Type h for help at any time while running rn. rn> (Revising soft pointers--be patient.) rn> Unread news in news.announce.important 11 articles rn> Unread news in news.announce.newsgroups 132 articles rn> Unread news in news.announce.newusers 45 articles rn> Unread news in news.newusers.questions 85 articles Chapter 7: Using USENET NorthWestNet User Services Internet Resource Guide 82 ...etc. rn> 11 articles in news.announce.important--read now? [ynq] Step 2. Select a newsgroup to read. The "[ynq]" prompt offers you some possible responses to the question "read now?" (y = yes, n = no, q = quit). In this and most other cases, though, you can still issue other commands. At this point, we will go to another newsgroup by typing "g" followed by the name of a newsgroup. In other newsreaders, you might use an arrow cursor, a mouse or a function key to obtain the same result. user> g news.announce.newusers rn> Group news.announce.newusers -- subscribe? [yn] user> y rn> 20 articles in news.announce.newusers--read now? [ynq] Step 3. To display the subjects of articles in a newsgroup, in "rn," you'd type the "=" sign. user> = rn> rn> rn> rn> rn> 286 Introduction to news.announce 287 Rules for posting to USENET 288 What is USENET? 289 A Primer on How to Work With the USENET Community 290 Answers to Frequently Asked Questions (etc..) Step 4. To read an article whose title interests you in "rn" simply type the article's number as shown in the column of numbers in the list above. rn> What next? [^Nnpq] user> 290 You'll then see the first page of the article you've requested. Each article begins with a header much like a standard e-mail header, and other header lines unique to USENET articles: rn> Article 290 (19 more) in news.announce.newusers (moderated): rn> From: [email protected] (Gene Spafford) rn> Subject: Answers to Frequently Asked Questions rn> Message-ID: <[email protected]> rn> Date: 25 Jul 91 23:15:55 GMT rn> Organization: Dept. of Computer Sciences, Purdue Univ. rn> Lines: 674 rn> Supersedes: <[email protected]> rn> Original-from: [email protected] (Jerry Schwarz) rn> [Most recent change: 23 Jul by [email protected] (G. Spafford)] rn> rn> Frequently Submitted Items rn> rn> This document discusses some questions and topics that occur rn> repeatedly on USENET. They frequently are submitted by new rn> users, and result in many follow-ups, sometimes swamping groups rn> for weeks. The purpose of this note is to head off these Chapter 7: Using USENET NorthWestNet User Services Internet Resource Guide 83 rn> annoying events by answering some questions and warning about rn> the inevitable rn> --MORE--(4%) The article has now filled up the screen. In rn, you press the space bar, to see the next screenfull of the message. user> <space bar> rn> consequence of asking others. If you don't like these answers rn> let [email protected] know. rn> rn> Note that some newsgroups have their own special "Frequent rn> Questions & Answers" posting. You should read a group for a rn> while before posting any questions, because the answers may rn> already be present. Comp.unix.questions and comp.unix.internals rn> are examples -- Steve Hayman regularly posts an article that rn> answers common questions, including some of the ones asked here. rn> rn> This list is often referred to as FAQ -- the Frequently Asked rn> Questions. If you are a new user of the USENET and don't find rn> an answer to your questions here, you can try asking in the rn> news.newusers.questions group. rn> --MORE--(4%) You now have several options, including displaying the next page of the article, saving it to a file on your computer, or leaving the article for another within the newsgroup. In rn, to save the file you type "s" or "w" followed by the name you want to give to the copy you're saving to your computer: user> s news.announce.newusers.faq rn> (messages and prompts about saving the file) rn> End of article 290 (of 305)--what next? [^Nnpq] To leave a newsgroup, you type another "q". You could go to another newsgroup by typing "g newsgroup.name". To leave "rn," you type a final "q". Exiting a newsgroup reader will return you to your computer's operating system. FOR MORE INFORMATION ABOUT USENET For Help Using An Already Installed Newsreader Your best bet is to use help within the newsreader software you are using. More extensive help can usually be found in help files or man pages which should be installed on your computer. If you can't find an answer to your question by consulting with online, printed, or local user services help, you can post a message to a USENET newsgroup. Of course, this is assuming your problem is not inability to post a message! Be sure to include the name and version of the newsreader you are using, and what operating system you are working with. If you don't, you either won't get an answer, or someone will snipe at you. By way of fair warning, posted questions about using USENET software raises some net-people's hackles. Chapter 7: Using USENET NorthWestNet User Services Internet Resource Guide 84 Published Book Todinao, G. 1986. "Using UUCP and USENET: A Nutshell Handbook." O'Reilly and Associates, Newton, MA. Online Information USENET is a particularly well-documented Internet resource. There are hundreds of FAQ files and other introductory materials to help get you started. This chapter represents a distillation of many of the "periodic postings" maintained and posted by Gene Spafford (to "news.announce.newusers"). By subscribing to a number of introductory USENET newsgroups, you will gradually learn the folkways of the USENET community, and become familiar with the many ways in which USENET can be used. Good Introductory USENET Newsgroups news.announce.newusers news.answers news.newusers.questions ADDENDUM 1: USENET NEWSREADING SOFTWARE PACKAGES AND SOURCE INFO This list of FTP sources for newsreader software is meant to be representative, not comprehensive. Most all of these packages can be found on many sites not listed below. Some of the best FTP sites for single-stop shopping appear to be gatekeeper.dec.com, uunet.uu.net, and wuarchive.wustl.edu. All archive sites and directory locations listed in this NUSIRG were checked for accuracy in September 1991. The actual name of the file in the indicated directory may not precisely correspond to the common name of the program. Some programs are stored in multiple pieces which have to be reassembled locally, and many are stored in a compressed or archived format. For example, vnews for SUN/OS in alw.nih.gov is stored as "vnews-sun4.tar.Z". For a more comprehensive or current listing of archival sites containing USENET newsreader software, try using "Archie" (described in detail in Chapter 6 of NUSIRG). Thanks to many USENET readers for helping me collect this information! Operating System and Program Name FTP site & directory or e-mail contact Directory Path minnehaha.rhrk.uni-kl.de ab20.larc.nasa.gov uunet.uu.net minnehaha.rhrk.uni-kl.de uunet.uu.net pub/amiga/UUCP amiga/utilities/comm/Arn068.lzh comp.sources.amiga/volume91/news pub/amiga/UUCP comp.sources.amiga/volume91/news tut.cis.ohio-state.edu uunet.uu.net HyperNeWS NeWS/HyperNeWS1.4 Amiga ann arn barn gnews vn Apple Mac HyperNeWS Chapter 7: Using USENET NorthWestNet User Services Internet Resource Guide Netnews 85 bitsy.mit.edu cricket.bio.indiana.edu earth.rs.itd.umich cricket.bio.indiana.edu earth.rs.itd.umich.edu [email protected] pub/news util/mac mac/utilities/communications util/mac mac/utilities/communications contact e-mail address at left wuarchive.wustl.edu ames.arc.nasa.gov tut.cis.ohio-state.edu perelandra.cms.udel.edu wuarchive.wustl.edu clvax1.cl.msu.edu mirrors/msdos/lan pub/MSDOS/PCRRN pcrrn src/Net/snuz usenet/comp.binaries.ibm.pc/ volume12/snuz winvn.zip samba.acs.unc.edu pub/news apple.com wuarchive.wustl.edu uunet.uun.net uxc.cso.uiuc.edu uxc.cso.uiuc.edu wuarchive.wustl.edu uunet.uun.net uunet.uu.net june.cs.washington.edu bode.ee.ualberta.ca plains.nodak.edu [email protected] gatekeeper.dec.com uunet.uu.net wuarchive.wustl.edu phloem.uoregon.edu uunet.uu.net pub/ArchiveVol1/gnu mirrors/unix-c/usenet news/nn pub/nnotes-1.4.tar.Z usenet/notes usenet/comp.sources.unix/volume1 usenet/comp.sources.unix/volume1 news/rn news pub/unix.Z pub/alt/tass send e-mail to user-id at left news/misc news usenet/comp.sources.unix/volume1/ * pub/src/x11 packages/X/contrib NetNews [email protected] nnr [email protected] see LISTSERV chapter for info on how to access LISTSERVers send e-mail to user-id at left kuhub.cc.ukans.edu uunet.uu.net vms.ecs.rpi.edu ANU_V60-3 news/anu-news newsrdr/ NewsWatcher TheNews uAccess MS-DOS pcnews pcrrn snuz WinVN NeXT next_nn UNIX Gnews nn nnotes notes readnews rn rrn tass tin trn vnews xrn VM/CMS VMS Anu-News Newsrdr Chapter 7: Using USENET NorthWestNet User Services Internet Resource Guide vnews 86 arizona.edu uhunix2f.uhcc.hawaii.edu software/vms/vnews pub/vms/vnews flash.bellcore.com pub/lispm/news-reader Symbolics Lisp news-reader Chapter 7: Using USENET NorthWestNet User Services Internet Resource Guide 87 Chapter 8: LISTSERV Discussion Lists WHAT IS LISTSERV? LISTSERV is a computer program installed on computers in the BITNET network which manages "Discussion Groups" (or "lists") for people who have shared interests. WHAT IS A LISTSERV DISCUSSION LIST? "LISTSERV discussion lists" (or discussion groups) are topic-oriented forums distributed by e-mail, dealing with a wide variety of topics. Once you've subscribed to a LISTSERV discussion list, messages from other subscribers are automatically sent to your electronic mailbox. To give you an idea of just how specific the topics can be, here are the subjects of 10 of the more than 2,000 currently active LISTSERV lists: Albert Einstein's Writings Apple-II Computer Ecology and the Biosphere Fly Fishing Funny Jokes, Funny Stories Human Genome Mapping Japanese Language Ocean Drilling Robotics Science Fiction You might be the only person in your entire county who'd want to read a whole newspaper every day about robots or fly fishing. But there are many people in the world who are interested in robots or fly fishing, and many of them are already communicating daily about their interests with services like LISTSERV discussion lists. No matter where you live, you can automatically receive messages from people who are subscribed to LISTSERV groups on topics that interest you. WHAT IS A LISTSERVER? A LISTSERVer is a copy of the LISTSERV program installed on computers on the BITNET network. Each LISTSERVer maintains subscription lists for a number of discussion groups. HOW DOES LISTSERV WORK? Any time you or someone else sends an e-mail message to the LISTSERVer which manages a discussion group, that LISTSERV program automatically distributes the message to every other subscriber. LISTSERV discussion groups make it easy for you to communicate with other people about a particular topic, without having to know their user-ids or e-mail addresses ahead of time. Chapter 8: LISTSERV DIscussion Lists NorthWestNet User Services Internet Resource Guide 88 The LISTSERV service is like an electronic newspaper, except every "article" is sent to you separately. Both LISTSERV discussion groups and newspapers contain news and articles concerning topics in which you are interested. Both allow you to contribute messages which are distributed to other subscribers. Subscribing to a LISTSERV discussion group is also similar to subscribing to a newspaper, except that you and a LISTSERVer communicate with e-mail, instead of postal mail. You find out what lists are available and request subscription or cancellation by sending e-mail to a LISTSERVer. A LISTSERVer uses e-mail to handle subscription information and to distribute messages to and from subscribers. A SHORT SUMMARY OF HOW TO USE LISTSERV FROM THE INTERNET 1. Get a catalog of LISTSERV discussion groups by sending e-mail to a LISTSERVer containing the message "list global." mail: message: listserv%[email protected] list global In a few minutes, the LISTSERVer will acknowledge your request and then send a copy of the "global list." 2. Read the "global list." Each line in this list has a list's name, the BITNET address of the LISTSERVer which manages that list, and a brief description of the list's discussion topic. Here are 5 lines from a global list. Listname Computer Address Brief Description AGRIC-L ALF-L ALLMUSIC ALTLEARN APPLE2-L AGRIC-L@UGA ALF-L@YORKVM1 ALLMUSIC@AUVM ALTLEARN@SJUVM APPLE2-L@BROWNVM Agriculture Discussion Academic Librarian's Forum Discussions on Music Approaches to Learning Apple II List 3. Select a LISTSERV group to which you want to subscribe and send an e-mail subscription request. *** IMPORTANT! *** The addresses in the global list are BITNET addresses. Internet must communicate through one of several BITNET-Internet "gateways." Here's how it works: BITNET address: Gateway address: listserv@NODE listserv%[email protected] where "NODE" is the BITNET address, and "GATE.WAY.ADDRESS" is one of the following BITNET-Internet gateways: cornellc.cornell.cit.edu or cunyvm.cuny.edu or mitvma.mit.edu For example, to subscribe to the AGRIC-L discussion group, use the following address and command string. mail: message: listserv%[email protected] subscribe agric-l your-full-name Chapter 8: LISTSERV DIscussion Lists NorthWestNet User Services Internet Resource Guide 89 4. You will receive acknowledgement of your subscription, a basic introduction about LISTSERV services, and messages from other subscribers to the discussion group. 5. To send a message to the group, send mail to the group's name at its address (using a BITNET.Internet gateway). mail message [email protected]@mitvma.mit.edu Whatever it is you want to send to the group! A SUMMARY OF BASIC LISTSERV COMMANDS LISTSERV is a computer program, so it only understands certain commands. Everything you "say" to a LISTSERVer in your e-mail messages has to fit a precise syntax. Here's a summary of important commands that you can send to a LISTSERVer, presented in the order in which you are likely to need them. Every one of these commands is used by putting it as a single line message in e-mail to a LISTSERVer. The LISTSERVer sends a response to you by e-mail. ❏ To see what LISTSERV groups are available: list global ❏ To get a LISTSERV "reference card" summarizing all LISTSERV commands: get refcard ❏ To subscribe to a LISTSERV group: subscribe LISTNAME your-full-name ❏ To cancel a subscription to a LISTSERV group: unsubscribe LISTNAME your-full-name ❏ To get an index of archived files about a group stored on a LISTSERVer: index LISTNAME ❏ To get a particular file from the index list: get FILENAME FILETYPE For example, the list "apple-2 might have files called "apple-2 logYYMM" where "YY" is a year and "MM" is a month. In other words, "apple-2 log9109" would be the log of discussions in apple-2 for September 1991. Chapter 8: LISTSERV DIscussion Lists NorthWestNet User Services Internet Resource Guide 90 WHAT EVERYONE SHOULD KNOW BEFORE USING LISTSERV LISTSERV is a BITNET Network Service LISTSERV is one of the notable services of BITNET, a network devoted to networking of educational institutions. Although BITNET LISTSERVers are available on the Internet, use of LISTSERVer by non-BITNET users should be viewed as a special privilege, not a right. BITNET is supported by annual dues from member institutions, so if you are not at a BITNET member institution, someone else is paying for your use of LISTSERV. Mail To the Discussion Group Is Sent To the List Name, Not to "LISTSERV" All messages which you want other people in the discussion group to read should be addressed to the name of the list. For example apple-2%[email protected] where "NODE" is the BITNET address, and "GATE.WAY.ADDRESS" is the BITNET-Internet gateway of your choice. All e-mail concerning subscriptions, LISTSERV help files, etc., should be addressed to the LISTSERVer: listserv%[email protected] In summary, "LISTSERV" is the user-id of a program which manages lists, and the list name is the user-id of the list which people read! Be sure you understand this difference. This is probably the biggest source of confusion which beginner LISTSERV users encounter. Many LISTSERV Groups Are Available Through "USENET" Many of the more popular LISTSERV groups are available through USENET, which *is* an Internet service. For more information on USENET, and how to find out which LISTSERV groups are available, see Chapter 7 of NUSIRG. There Are Many LISTSERVers Throughout The World In step 1 of the previous example, you were shown how to send a message to a particular LISTSERVer, the LISTSERVer at the BITNET Network Information Center (BITNIC). Any listserv command can be sent to any computer which has the LISTSERV program. The "global list" contains the BITNET addresses of all computers which have LISTSERVers. Chapter 8: LISTSERV DIscussion Lists NorthWestNet User Services Internet Resource Guide 91 Many LISTSERVers Are Installed On Computers Which Are Part Of BITNET *And* The Internet For example, the IBM 3090 at the University of Washington, "uwavm.u.washington.edu", is also directly connected to BITNET, and is known in the BITNET world as "uwavm". In such cases, you can send messages to a LISTSERVer directly without having to go through a gateway. For example, you can communicate with the LISTSERVers at UW with the following mail message: mail: [email protected] LISTSERV Subscriptions Can Become Overwhelming Unlike a newspaper, which is usually only delivered once a day, with all the articles in a single package, LISTSERV discussion groups send every article by itself to every subscriber of the discussion group. Some LISTSERV groups are very active, and can send 10's if not 100's of messages to your electronic mailbox every day. If you've ever subscribed to two or more newspapers, you know how quickly last weeks and last months issues can pile up. Now imagine that instead of a single issue of each newspaper each day, you had to separately handle every single article from every newspaper every day! This is one of the main drawbacks to the LISTSERV system. If you're subscribed to several LISTSERV discussion groups, and don't check you electronic mailbox for a couple of days, you might find several hundred mail files from LISTSERVers waiting for you. Reading all of these files, or even deleting them all, can take hours of your time. If you are using a small computer system, the impact on your computing and disk resources could be substantial, even disastrous. FOR MORE INFORMATION ABOUT LISTSERV The best sources of information about LISTSERV LISTSERVers and the people who subscribe to LISTSERV groups. To get LISTSERV help files and other information, send one of the following commands to the LISTSERVer of your choice. Command What You Will Get get info filelist a list of all LISTSERV files on that LISTSERVer containing LISTSERV help get tools filelist a list of useful LISTSERV tools for the LISTSERV program (such as LISTDB which is a very powerful database program) for searching LISTSERV log files for information) help a brief list of LISTSERV commands info refcard an expanded list of LISTSERV commands Chapter 8: LISTSERV DIscussion Lists NorthWestNet User Services Internet Resource Guide 92 index a list of all files stored on that LISTSERVer list global a list of all lists known to that LISTSERVer Chapter 8: LISTSERV DIscussion Lists NorthWestNet User Services Internet Resource Guide 93 Chapter 8: LISTSERV DIscussion Lists NorthWestNet User Services Internet Resource Guide 94 SECTION 4: KNOWLEDGE AT YOUR FINGERTIPS Chapter 9: Electronic Journals ............................................................................................... 96 What Are Electronic Journals?................................................................................. 96 What Kinds of Electronic Journals are Available?.................................................... 96 How to Subscribe to Electronic Journals .................................................................. 96 For More Information About Electronic Journals ..................................................... 97 Chapter 10: Electronic Books ................................................................................................ 98 What Are Electronic Books?.................................................................................... 98 How Do You Use Electronic Books? ....................................................................... 98 Project Gutenberg .................................................................................................... 98 The Advantage Foundation ...................................................................................... 100 The Oxford Text Archives ....................................................................................... 101 For More Information About Electronic Books ........................................................ 102 Chapter 11: Accessing Library Catalogs Through The Internet.............................................. 103 What You Can Do With All OPACs ........................................................................ 103 Additional Special Features of Some OPACs ........................................................... 103 What You Can't Do (Yet) With OPACs ................................................................... 104 Essential Guides for Using OPACs .......................................................................... 104 Effective Use of Online-Catalogs (or, "How to Think Like an OPAC").................... 105 Getting Started With Internet Access of OPACs....................................................... 105 For More Information About OPACs and Related Topics ........................................ 117 Chapter 12: Internet Accessible Databases and Bibliographies .............................................. 119 What Is Included In This Chapter............................................................................. 119 What is NOT Included Here, and Where to Find It .................................................. 119 Databases of Databases ............................................................................................ 119 What You Need to Use Internet Databases............................................................... 120 Organization of the Chapter ..................................................................................... 120 Organization of the Entries ...................................................................................... 121 Chapter 13: WAIS ( Wide Area Information Server ) : An Interface to Databases ................. 148 What is WAIS?........................................................................................................ 148 How WAIS Works ................................................................................................... 148 For Current Information About WAIS...................................................................... 149 For More Information On WAIS .............................................................................. 157 Keeping Up To Date With WAIS............................................................................. 157 Technical Contact:................................................................................................... 158 Published References About WAIS.......................................................................... 158 Chapter 14: Internet Directory Services ................................................................................. 159 Overview of Using Internet Directory Services ........................................................ 159 Current Capabilities of Internet Directory Services .................................................. 160 Technical And Ethical Challenges to Internet Directory Services............................. 160 Finding A Person On the Internet (The Easy Way)................................................... 161 Finding a Person on the Internet with Directory Services ......................................... 161 Knowbot Information Server (KIS) .......................................................................... 163 USENET-Addresses Server (U-ASK)....................................................................... 165 PSI White Pages Pilot X.500 Project........................................................................ 166 Internet Directory Services: Where Do We Go From Here? ..................................... 169 Section 4: Knowledge at Your Fingertips NorthWestNet User Services Internet Resource Guide 95 Information Services on the Internet By now, you are probably aware that many of the services mentioned in Sections 2 and 3 of NUSIRG are tremendous sources of information: FTP file archives contain a wealth of computer programs and documents, and many USENET and LISTSERV groups are filled with useful and informative discussion. Section 4, however, is devoted to more formal and highly structured sources of information, such as library catalogs and databases. ELECTRONIC JOURNALS Electronic journals are essentially like printed magazines, except they are distributed as computer files in a network. ELECTRONIC BOOKS Electronic books, or e-texts, are essentially the electronic equivalents of regular printed books. ONLINE PUBLIC ACCESS CATALOGS (OPACS) OPACs are network accessible library catalogs which you can browse from your own computer. ONLINE DATABASES AND BIBLIOGRAPHIES These services allow you to access databases which you can use for research or education. WIDE AREA INFORMATION SERVER (WAIS) WAIS is an example of a "database of databases" which can pull together diverse information services available on a network into one easy-to-use service. Applications like WAIS are likely to become essential tools for quick and easy access to the wealth of information stored in computer networks. NETWORK DIRECTORY SERVICES These services allow you to locate people and computers on a network, much like you would use "white pages" or "yellow pages" to find the phone numbers of people and services. Section 4: Knowledge at Your Fingertips NorthWestNet User Services Internet Resource Guide 96 Chapter 9: Electronic Journals WHAT ARE ELECTRONIC JOURNALS? "Electronic journals" are the computer network equivalent of printed magazines in form and function. They usually feature submitted articles, which are screened and edited to a common format, and often deal with a relatively broad topic. "Electronic newsletters" are usually shorter, more specific, and, as the name would suggest, more oriented towards news and announcements. WHAT KINDS OF ELECTRONIC JOURNALS ARE AVAILABLE? There are a wide variety of electronic journals and newsletters which, just like printed magazines, range from the mainstream to the esoteric. Some electronic journals are nearly indistinguishable from formal and scholarly printed journals of learned societies. These journals are published only after rigorous "peer review" and articles accepted for publication focus on the leading concerns of established academic disciplines. Other journals are considerably more informal and contain a wide variety of articles of general interest. The documents listed in the "For More Information Section" provide comprehensive and up-to-date listings of the many electronic journals and newsletters which are available. HOW TO SUBSCRIBE TO ELECTRONIC JOURNALS To get regular printed magazines, you can subscribe and have each issue sent to you by mail, or you can go to a newsstand to pick up each issue individually. Obtaining electronic journals works in essentially the same way, except everything is done from a computer on the Internet. 1. You can send a subscription request and receive each issue via electronic mail 2. You can obtain current or old issues via FTP, LISTSERVers, or mail-servers Here's an example of how to subscribe to an electronic journal known as "The Electronic Journal of Communication / La Revue Electronique de Communication," a bilingual, quarterly journal devoted to communication theory, research, practice and policy. Address an e-mail message to: [email protected] containing the message: join ejcrec your full name e.g.: Chapter 9: Electronic Journals NorthWestNet User Services Internet Resource Guide 97 join ejcrec Jane Q. Public Note that this subscription request, as is the case with many subscription requests, will be processed by an electronic mail server - a computer program which only understands a certain limited and specific set of commands (for more information on electronic mail servers, refer to Chapter 3 of NUSIRG). The information you will need to subscribe to or obtain back issues of most available electronic journals are provided in the documents listed below. FOR MORE INFORMATION ABOUT ELECTRONIC JOURNALS If you want to subscribe to electronic journals, you should get a copy of the document entitled "Directory of Electronic Journals, Newsletters, and Scholarly Discussion Lists," published by the Association of Research Libraries. This directory currently lists over 500 scholarly lists, about 30 journals, over 60 newsletters, and 15 "other" titles including some newsletter-digests and specific instructions for obtaining each publication by mail or via FTP. Electronic copies of this directory are currently available from the following LISTSERVers: [email protected] listserv%[email protected] Filenames (notice the spellings!): ejournl1 directry ejournl2 directry Example Syntax: mail: subject: message: listserv%[email protected] (none necessary) get ejournl1 directry If you want to purchase a bound book version of this information, contact: Office of Scientific & Academic Publishing Association of Research Libraries 1527 New Hampshire Avenue, NW Washington, DC 20036 USA e-mail: phone: arlhq%umdc@ (202) 232-2466 or 462-7849 Chapter 9: Electronic Journals NorthWestNet User Services Internet Resource Guide 98 Chapter 10: Electronic Books WHAT ARE ELECTRONIC BOOKS? In the broadest sense, an electronic book is any document which is lengthy enough to be considered a book, and which is stored on a diskette, a hard drive, a magnetic tape, or a compact disk (CD). By this definition, you are currently reading part of an electronic book, since the NUSIRG is available, in its entirety, as files from the NorthWestNet FTP archives. And, by this definition, the many computer-related manuals which are available by FTP can also be thought of as electronic books, sometimes referred to as "e-texts." But this chapter will focus on a special class of electronic books, "classical texts" of world literature such as The Declaration of Independence, The Great Gatsby, the Bible and the Koran, the Oxford English Dictionary, or even "Hikayat Indraputra," the notable Malay romance. HOW DO YOU USE ELECTRONIC BOOKS? Electronic books are stored as computer files. You can read electronic books at your computer screen, print them out in plain text, and if you have access to the right hardware and software, you can often print elegantly formatted output on a laser printer. The rest of this chapter describes each of the three current major providers of electronic books: Project Gutenberg and The Advantage Foundation, which concentrate on "popular" classics in the English language; and The Oxford Text Archives, which is a repository for hundreds of e-texts of special interest to literary scholars. The Oxford Text Archive service also features an information service to tell you about the source of many other e-texts throughout the world. PROJECT GUTENBERG Project Gutenberg is a not-for-profit organization whose goal is to prepare electronic editions of more than 10,000 books by the year 2001. All documents are available as text-only files, but many can also be obtained in fancy PostScript or troff formats. As of September, 1991, the following e-texts are being distributed by Project Gutenberg: Alice in Wonderland As You Like It Declaration of Independence The Federalist Papers The Holy Koran Through the Looking Glass Moby Dick The Book of Mormon The Hunting of the Snark U.S. Constitution The World Fact Book The Night Before Christmas Chapter 10: Electronic Books NorthWestNet User Services Internet Resource Guide 99 Many other documents are currently being prepared by Project Gutenberg, including The Oxford English Dictionary, Paradise Lost, Peter Pan, and even the 11th Edition of the Encyclopedia Britannica. How to Obtain Project Gutenberg E-Texts Electronic books from Project Gutenberg can be obtained most easily by FTP or mail-server. If you don't have access to the Internet, you can purchase floppy disk versions by postal mail, but mail orders will be considerably slower for you, and more time consuming for Project Gutenberg. FTP Hosts for Project Gutenberg E-Texts As of September 1991, Project Gutenberg files could be retrieved from the following FTP Hosts: 1. FTP Host: directory: filenames: quake.think.com pub/etext alice27a.txt as-you-like-it.text ...etc. 2. FTP Host: directory: filenames: mrcnext.cso.uiuc.edu etext alice26a.txt lglass16.txt ...etc. 3. FTP Host: directory: filenames: oes.orst.edu pub/almanac/guten alice27a+.ms.Z alice27a.txt.Z ...etc. (Note that most files in this FTP Host are in compression format.) Almanac Mail Server for Project Gutenberg E-Texts You can also order copies of Project Gutenberg documents by sending an e-mail message to the Oregon Extension Service's Almanac Information Server: mail: subject: [email protected] (none needed) send guten FILENAME where "FILENAME" is one of the following filenames alice koran snark as-you-like-it lglass us-const dec-of-ind moby world feder mormon xmas For more information on the Almanac Information Server (which provides many other services as well), send the following e-mail message: mail: [email protected] Chapter 10: Electronic Books NorthWestNet User Services Internet Resource Guide subject: message: 100 (none needed) send guide For More Information About Project Gutenberg Project Gutenberg is a not-for-profit effort which relies on volunteer assistance for submission and proofing of electronic texts, and legal issues concerning copyright law. For more information, contact: Michael S. Hart, Director Project Gutenberg 405 West Elm St. Urbana, IL 61801 [email protected] THE ADVANTAGE FOUNDATION Like Project Gutenberg, the Advantage Foundation is a not-for-profit organization concentrating on English language literature. As of September, 1991, the following e-texts were available from The Advantage Foundation: Common Sense Adventures of Sherlock Holmes (Part 1) Sherlock Holmes: A Study in Scarlet The Adventures of Tom Sawyer U.S. Constitution War of the Worlds How to Obtain Advantage Foundation E-Texts The Advantage Foundation is not yet connected to the Internet. Files can be downloaded from an easy-to-use Bulletin Board Service (BBS) in Houston, TX, accessed via a modem call to (713) 977-9505. Files at the Advantage Foundation are stored in compressed format (ZIP). For information on how to download and handle "zipped files," consult the passage in Chapter 4 of NUSIRG entitled "The ABC's Of Handling Special Files." For More Information About the Advantage Foundation The Advantage Foundation P.O. Box 773425 Houston, TX 77215 (713) 977-1719 (Fax/Voice Mail) (713) 977-9505 (Bulletin Board Service) Chapter 10: Electronic Books NorthWestNet User Services Internet Resource Guide 101 THE OXFORD TEXT ARCHIVES Unlike Project Gutenberg and The Advantage Foundation, the Oxford Text Archives is oriented towards e-texts of special interest to literary scholars. It contains hundreds of e-texts in many different languages. Many of the etexts contained in this archive either have to be purchased, or have restrictions on their distribution and use. Nonetheless, this is a truly extraordinary resource which deserves your interest. Here is a very brief excerpt from The Oxford Text Archives' large holdings to give you a feeling of the wealth and variety of materials that are available from this source: A la Recherche du Temps Perdu Arabic Prose Samples. Aristotle, Complete Works (in Greek) Beowulf Blues Lyric Poetry: An Anthology British Columbian Indian Myths Chinese Telegraphic Code Character Set Das Nibelungenlied Etymological Dictionary of the Gaelic Language Genji Monogatari Hamlet Hikayat Indraputra (a Malay Romance) Homer, Complete Works (in Greek) Hyckerscorner. Wynkyn de Worde Il paradiso, Il purgatorio, L'Inferno Llyr gwyn Rhydderch: Ronabwy MRC Psycholinguistic Database Orwell's "1984" (in Croatian) Plato, Collected Works (in Greek) The Aeneid The Origin of Species Another extraordinarily valuable service of The Oxford Text Archives is a database of information about e-texts available from other archives around the world! How To Access The Oxford Text Archives Direct network access to The Oxford Text Archives is currently only possible from within England via the JANET Network: FTP Host: file: uk.ac.ox.vax [archive].snapshot.lis Access from the Internet in the United States via the Internet-Janet Gateway (TELNET to sun.nsf-relay.ac.uk) may be possible by time you read this guide. For more up-to-date information on this gateway service, send an email message with the following two lines of text in the body of your message: mail: subject: message: [email protected] (none needed) Request:janetpad Chapter 10: Electronic Books NorthWestNet User Services Internet Resource Guide Topic: 102 userguide For More Information About The Oxford Text Archives The definitive U.S. FTP host for information about the Oxford archives is: FTP Host: directory: files: ra.msstate.edu pub/docs/history/e-documents oxford.text.archives oxford.text.order.form (general description) (how to get e-texts) You can also contact the archives by postal mail or e-mail. E-mail inquiries will, in general, be processed much more quickly. Oxford Text Archive Oxford University Computing Service 13 Banbury Road, Oxford OX2 6NN, UK e-mail: [email protected] FOR MORE INFORMATION ABOUT ELECTRONIC BOOKS This is a rapidly growing area, and by the time you read this, there may be many additional providers of electronic books other than the three discussed in this document: 1. The Oxford Text Archives maintains a database of information about e-texts available from many other archives around the world: Oxford Text Archive Oxford University Computing Service 13 Banbury Road, Oxford OX2 6NN, UK e-mail: [email protected] 2. The following discussion group is currently mostly for and about Project Gutenberg, but it also a forum for discussion about the many issues (legal, pedagogical, etc..) concerning e-texts generally. Listserv Discussion Group mail: subject: message: listserv%[email protected] (none needed) subscribe gutnberg YOUR-FULL-NAME USENET Newsgroup (cross-posting of the Listserv Discussion Group) bit.listserv.gutnberg Chapter 10: Electronic Books NorthWestNet User Services Internet Resource Guide 103 Chapter 11: Accessing Library Catalogs Through The Internet The library was laid out on a plan which has remained obscure...only the librarian has received the secret, and he communicates it, while still alive, to the assistant librarian...only the librarian has, in addition to that knowledge, the right to move through the labyrinth of the books, he alone knows where to find them and where to replace them...The other monks may know the list of the volumes that the library houses; only the librarian knows, from the collocation of the volume, from its degree of inaccessibility, what secrets, what truths or falsehoods, the volume contains...a spiritual labyrinth, it is also a terrestrial labyrinth... Umberto Eco The Name of the Rose Hundreds of the world's best libraries are now accessible to anyone connected to the Internet. Access to most of these libraries is completely free, and usually available any time, day or night, from anywhere in the world. Over the past decade, many libraries have started putting their card catalogs into computer databases that can be used with "online library catalogs" or "online public access catalogs" ("OPACs"). Using an OPAC is essentially just like using a card catalog. The only difference is that instead of pulling drawers and riffling through cards, you login to an OPAC from a computer, and search the catalog by typing the key words on which you want to base your search. No matter how small your local or institutional library is, information about tens of millions of books and articles is now at your fingertips. Thus, it's easy to understand why OPACs are a significant and extremely powerful development in access to information. WHAT YOU CAN DO WITH ALL OPACS ❏ ❏ ❏ Search for books by subject, title, or author. Obtain detailed bibliographic information about the books found by your search. If you are accessing an OPAC from your own mainframe account or a personal computer, you can save the on-screen results of your searches to your own computer for local use. (For example, the program, 'script' in UNIX will save what appears as output to your screen to a file. Type "man script" to get more information.) ADDITIONAL SPECIAL FEATURES OF SOME OPACS In addition to the basic subject/title/author searches, many OPACs allow you to do one or more (or even all) of the following: ❏ ❏ read brief summaries of books or articles, search for articles from newspapers and/or journals, Chapter 11: Accessing Library Catalogs Through the Internet NorthWestNet User Services Internet Resource Guide ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ 104 search catalogs of special collections: CDs, videos, movies, photographs, maps, microfilm, and phonographs, search special databases, do searches by other variables, such as "keywords," construct pin-point searches with the logical operators AND, OR, and NOT, or other specialized searching functions, determine if a book is currently checked out, set up inter-library loans, if there are multiple copies of a book in various branch libraries served by the OPAC, find the location of the nearest copy, and record results of your search and send them instantaneously (or by e-mail ) to your own computer for local use. WHAT YOU CAN'T DO (YET) WITH OPACS ❏ ❏ read the actual text of documents or browse randomly through the library's shelves, encountering books, that by chance, may turn out to be tremendously interesting for current or unanticipated interests. (Thus OPACs currently do not foster the "serendipity effect.") ESSENTIAL GUIDES FOR USING OPACS If you are planning to use OPACs through the Internet, you will find the following two documents very useful. These documents provide detailed access and descriptive information about the rapidly growing number of OPACs you can access through the Internet. Both of these sources are available from many FTP hosts throughout the Internet; the hosts listed are the definitive repositories for these documents, and will always have the most upto-date editions. 1. "Internet Accessible Library Catalogs & Databases," by Art St. George and Ron Larsen. FTP Host: Directory: Files: nic.cerf.net cerfnet/cerfnet_info internet-catalogs-08-91.txt internet-catalogs-04-91_apl.ps (text only) (Apple PostScript) Note that the filename contains the date the file was most recently updated. This may be different by the time you FTP from this archive. 2) "University of North Texas' Accessing Online Bibliographic Databases," by Billy Barron. FTP Host: Directory: vaxb.acs.unt.edu library Files: libraries.ps libraries.txt libraries.wp (this directory contains many other useful files on OPACs) (PostScript version) (ASCII, text only version) (Word Perfect 5.0 version) Run--do not walk--to your terminal, and FTP one or both of these essential resources. Chapter 11: Accessing Library Catalogs Through the Internet NorthWestNet User Services Internet Resource Guide 105 EFFECTIVE USE OF ONLINE-CATALOGS (OR, "HOW TO THINK LIKE AN OPAC") If you've never used the card catalog of a large library, you're in for a big surprise. Searches through OPACs can yield hundreds or even thousands of citations for what you might think are highly specialized topics. Searches for individual authors tend to yield manageable results. But subject searches, especially if the subject is not chosen carefully, may deposit many screen-fulls of information to your terminal. For example, most American OPACs use Library of Congress Subject Headings which are very precise and highly structured. Subject headings which are intuitively sensible to you may not yield ANY search results, if they do not correspond precisely to an entry in the OPAC's list of subject headings. Although some OPACs will display available subjects on your terminal, it is sometimes useful to consult the "Library of Congress Subject Headings" book before beginning a large scale OPAC search. This reference is available at most libraries. There is also a "Medical Subject Headings" volume useful for services like Medline. There are a number of things to keep in mind which will make it easier to find what you're looking for when using an OPAC. ❏ ❏ ❏ ❏ Start with a very specific search. Use special search tools, such as the logical operators AND, OR, and NOT, or wildcard symbols, if they are available. When you find an entry which seems to be very close to what you need, examine its subject, title, author, and keyword fields. This can help you narrow or broaden your search, and may lead you to other appropriate entries by suggesting search terms you might not have considered ahead of time. If one OPAC doesn't give you the reference(s) you want, try another, or consult the Barron or St. George list to see if a particular OPAC is very strong in the subject you are researching. GETTING STARTED WITH INTERNET ACCESS OF OPACS Here is a list of a few Internet accessible OPACs in the United States and Canada to try out. Internet Address Institutional Affiliation Login Information bootes.unm.edu bull.utulsa.edu cts.merit.edu develnet.ucalgary.ca melvyl.ucop.edu nls.adp.wisc.edu pac.carl.org University of New Mexico University of Tulsa University of Michigan University of Calgary University of California University of Wisconsin Colorado Alliance of Research Libraries login: STUDENT1 login: LIAS,TU none Request: library none none none There are hundreds of other OPACs available, so don't make these your default sites. If you decide you are going to use OPACs for teaching or research, be sure to get a copy of either or both the Barron or St. George/Larsen catalogs so you can learn about other OPACs that may be closer geographically and in areas of specialization. A Sample OPAC Session There are many different software packages for OPACs. To further complicate matters, some of the most widely used packages can be modified heavily by particular sites, and some sites use home grown packages which may have very peculiar features and behaviors, especially when used from remote locations via TELNET. Chapter 11: Accessing Library Catalogs Through the Internet NorthWestNet User Services Internet Resource Guide 106 However, there are enough similarities between OPACs that a sample session from one should give you a fair indication of what using most other OPACs is like. This section presents a session using the University of California's MELVYL System. Note that this session has been edited slightly to make it easier to read on a page. This session illustrates the essential steps you'd want to take when using most any OPAC: Step 1. TELNET to the OPAC of your choice. For OPACs using IBM based systems, use a TELNET capable of 3270 emulation (e.g. tn3270). Step 2. Enter a terminal type. (vt100 is usually a safe bet.) Step 3. Use online help. (Repeat as necessary.) Step 4. Select a database within the OPAC. Step 5. Select the degree of prompting you want from the system while doing your search (e.g., be led by the hand, or plow right through.) Step 6. Select a search type (typically, Author, Subject, Title). Step 7. Enter a value for the search. (NOTE: Steps 6 and 7 are often a single step in other OPACS, e.g., "SU=ENDANGERED SPECIES.") Step 8. If necessary, redefine and/or refine your search. Step 9. Repeat steps 3-9, in any order, for additional searches. Step 10. Logoff and end your TELNET session. Throughout the session, lines on which the user is prompted by the OPAC begin with a "U>". Words printed by the OPAC on the prompt line are in all uppercase. Responses typed by the user appear in lower case. As always, <RETURN> means press the RETURN key on your keyboard (or, in some cases, the ENTER key). Note that this OPAC session is rather long - intentionally. It would have been easy to present a quick and easy session which immediately produced references to thousands of citations. But as you probably know from your experience with regular card catalogs, effective use of a library system often requires careful consideration and reconsideration of how to define your literature search. This OPAC session is meant to reflect this reality: the first search in this example yields no results, but by modifying the search slightly, and following suggestions from MELVYL, a very similar search yields more than 500 citations! Step 1. TELNET to the OPAC. To get started, TELNET into MELVYL, and then you will be prompted to provide some information about the computer from which you are working. Chapter 11: Accessing Library Catalogs Through the Internet NorthWestNet User Services Internet Resource Guide 107 U> telnet melvyl.ucop.edu 22:13:22 Type START and press RETURN key to begin session U> <RETURN> Please Enter Your Terminal Type Code or Type HELP for a List of Codes. U> TERMINAL? help Please enter the Terminal Type Code for your terminal. Supported Terminal Types and their character codes are: CODE TERMINAL CODE TERMINAL TTY33 ESPRIT PE1100 HARDCOPY IBMPC KERMIT ACT5A HP2621 TI700 TELE920 TANDEM Teletype 33 (TTY) Hazeltine Esprit Perkin Elmer 1100 Decwriter/Gencom IBM Personal Computer KERMIT Emulation Microterm Act5a Hewlett Packard HP2621 TI Silent 700 Televideo 910, 912, 920 Tandem 635X BANTAM ADM3A HAZ1500 HAZ2000 HEATH VT100 ADDS BITGRAPH TTY40 DISPLAY OTHER Perkin Elmer Bantam ADM 3a Hazeltine 1500 Hazeltine 2000 Heathkit H19 Dec VT100 ADDS/NCR BBN Bitgraph Teletype 40 (TTY) IBM Displaywriter All Others Please Enter Your Terminal Type Code or Type HELP for List of Codes. Step 2. Enter a terminal code. "Terminal type" does not mean "is your computer a Macintosh or an IBM mainframe?" but rather "what kind of terminal can your computer 'emulate'?" Any particular computer can, depending upon installed software, emulate one or more terminal types. With some TELNET services, you can ask for a display of the terminal types supported by that particular service. The list displayed by MELVYL includes VT100, a kind of "full screen" terminal emulation very frequently included in personal computer and mainframe telecommunication software packages. If you're not sure what kind of terminal emulation your computer is using, many OPACs and other TELNET services allow you to use a "dumb" terminal type which performs the most basic "teletype" functions. In MELVYL, the dumb terminal type is called "other," which is what we'll use for this sample session. Chapter 11: Accessing Library Catalogs Through the Internet NorthWestNet User Services Internet Resource Guide 108 U> TERMINAL? Other Press RETURN for the MELVYL Catalog U U> <RETURN> Welcome to the University of California's MELVYL* LIBRARY SYSTEM (c)1984. *Registered trademark of The Regents of the University of California. OPTIONS: Choose an option, or type any command to enter the CATALOG database. HELP [return] START <db> For help in getting started. Press RETURN to choose a database for searching. Type START <database name> to search a database. Step 3. Investigate the online help. Notice that at the end of step 2, MELVYL offered help in getting started. You can save a great deal of time and make better use of online resources if you investigate any help that might be offered. In MELVYL, the "help" command can be used to display what options are available at certain points during your session. U> help The options for proceeding are: [return] START <db> Any command Press RETURN to see the list of MELVYL system databases. You may then choose a database to search. If you already know the name of the database you want to search, type START and the database name, e.g., START CC. By typing any other valid command, e.g., FIND or EXPLAIN, you will enter the CATALOG database. U> <RETURN> In the last screen we've pressed the RETURN key which yields a display of MELVYL catalogs. Chapter 11: Accessing Library Catalogs Through the Internet NorthWestNet User Services Internet Resource Guide 109 MELVYL SYSTEM DATABASES Select one database from the list below. Library Databases: TEN CAT PE For faster searches, type TEN; Ten-Year MELVYL Catalog; materials published from 1981-1991. Full MELVYL Catalog - UC libraries and California State Library. Periodical Titles - Calif. Academic Libraries List of Serials. Journal Article Indexes: (for UC users only; password may be needed) CC CCT MED CURRENT CONTENTS CURRENT CONTENTS MELVYL MEDLINE current articles in all subject areas. journal tables of contents in all subjects. articles in medical and life sciences. Other Systems: OTHER To select other library catalogs and remote information systems. Shortcut: type any command to enter the CAT database (e.g., FIND or EXPLAIN) Type the code for one option (e.g., TEN), HELP, or END to end your session. Step 4. Select a database within the OPAC. For this session, we'll use the MELVYL Ten-Year database, which only includes materials published in the last 10 years. Notice that MELVYL's holdings for this brief period includes more than 1.5 million distinct titles! U> start ten Command being issued: START TEN Welcome to the MELVYL TEN-YEAR Catalog Database Contents: Coverage: OPTIONS: HELP COMMAND LOOKUP START END As of 9/8/91, approximately 1,580,596 titles representing 3,578,900 holdings, for materials in the University of California libraries, and the California State Library, Publication dates 1981 through 1991. Type an option and press RETURN, or type any command. For help in getting started. To use commands and for periodicals; use any time. For Lookup Mode--the system leads you through commands. To start over or change databases. To end your session. Chapter 11: Accessing Library Catalogs Through the Internet NorthWestNet User Services Internet Resource Guide 110 Step 5. Select what degree of prompting you want from the system. Many interactive Internet services allow you to tailor sessions to your level of expertise, ranging from step-by-step help for new users, to a nearly blank screen for expert users. The information presented in the previous screen indicates that one can type "lookup" for extensive prompting. U> TEN -> lookup Welcome to Lookup Mode in the TEN-YEAR Catalog Database You can start searching without learning the command language by following the prompts below. You will see the appropriate commands used for your search. At any time, you can also type: SET MODE COMMAND START CAT END to change to Command Mode. to change to the full CATALOG database. to end your session. Press RETURN to begin. U> TEN -> <return> Now let's go back to the Ten-Year catalog, and continue with step-by-step help. In Lookup Mode, you can search for books at the following libraries: Code ALL UCB MOF UCD UCI UCLA COL UCR UCSD SDU UCSF UCSB UCSC Library All libraries in MELVYL Berkeley; includes MOF, UCB Moffitt Undergrad. Lib. Davis and UCD NRLF Irvine and UCI SRLF Los Angeles; includes COL UCLA College Undergrad. Lib. Riverside San Diego; includes SDU San Diego Undergrad. Lib. San Francisco and UCSF NRLF Santa Barbara Santa Cruz and UCSC NRLF Code CAS CRL CSL HAS LBL LAW MED NOR SOU UC Library California Academy of Sci. Center for Res. Libraries California St. Lib.; incl. Sutro Lib., S.F., CSL NRLF Hastings Law Library Lawrence Berkeley Lab UC Law: UCB UCD UCLA HAS UC Med. libraries.: UCD UCI, UCLA,UCSD, UCSF North UC libs.: UCB, UCD, UCSC, UCSF, HAS, LBL South UC libs.: UCI, UCLA, UCR, UCSB, UCSD All, except CAS CRL CSL Type the code for your library or type ALL for all libraries in the catalog, then press RETURN. You can type up to 4 codes. Type HELP for more information. Chapter 11: Accessing Library Catalogs Through the Internet NorthWestNet User Services Internet Resource Guide 111 We've been asked which library we want to use; in this sample session, we'll search through all of the University of California libraries. U > TEN -> all Welcome to Lookup mode. You can search for books by: -the name of the person who wrote the book -by the title of the book -or by the Subject headings assigned to the book Type PA SU TI HELP END (Personal Author) (Title) (Subject) for one of the following choices: Personal Author search Subject search Title search More information on choices End your session. Step 6. Select a search type. Now we'll indicate that we want to search through the catalog by subjects (type "su"): U> TEN -> su Type SUBJECT heading words, or type HELP, then press RETURN. U> TEN -> help You have selected the SU index. A subject may be a topic, a geographic place, or a person. Ask a reference librarian for "Library of Congress Subject Headings" or for "Medical Subject Headings," to help identify an official heading to use in your subject search request. Try to be as specific as possible; otherwise you will retrieve more books than you can look at easily. For example, typing the words MARINE BIOLOGY PACIFIC OCEAN is more specific than typing BIOLOGY. If you do not find the books you want, try repeating your search as a title search or ask a librarian for assistance. Type SUBJECT heading words, then press RETURN. Step 7. Enter a value for the search. Now we can enter a subject; let's try "extinction of species" which we'll abbreviate as "extinction species": Chapter 11: Accessing Library Catalogs Through the Internet NorthWestNet User Services Internet Resource Guide 112 U> TEN -> extinction species Command being processed: FIND SU EXTINCTION SPECIES Search request: FIND SU EXTINCTION SPECIES Search result: 0 records in the TEN-YEAR Catalog database Please type HELP for information on zero search results. Since your Subject search had zero results, you might want to try your search again as a Title Word (TW) search using 2 or 3 significant words. Please type HELP for more information on zero results. Type choice, or type END to end session: TW TI Title Word search New Title search PA SU New Personal Author search New Subject search Or type START CAT LOOK to leave the TEN-YEAR database and try your search in the full CATALOG database. U> TEN -> tw No books were found with a request using "extinction species" as our subject. But don't give up yet! MELVYL now allows the option of doing another search by several other fields, including the words in the book's titles (TW). Let's try another search, looking for books which have the words "species" and "extinction" in their titles: Type 2 or 3 important words from the TITLE of the book you want, or type HELP, then press RETURN. U> TEN -> extinction species Command being processed: FIND TW EXTINCTION SPECIES The search string "extinction species," which did not find anything during a subject search, locates 13 relevant titles with a Title Word search. Chapter 11: Accessing Library Catalogs Through the Internet NorthWestNet User Services Internet Resource Guide 113 Search request: FIND TW EXTINCTION SPECIES Search result: 13 records in the TEN-YEAR Catalog database 1. Balancing on the brink of extinction : the Endangered Species Act and lessons for the future / edited by Kathryn A. Kohm. Washington, D.C. : Island Press, c1991. UCB BioSci KF5640 UCD Main Lib KF5640 UCI Main Lib KF5640 UCSC McHenry KF5640 UCSD Scripps KF5640 .B35 1991 CAS Mailliard KF5640 .B35 .B35 .B35 B35 Floor 3 .B35 1991 1991 1991 1991 1991 Type choice, or type HELP for help, END to end session: NS SHO LON REV Next screen of Short display Different records in Short Long display Review display PA SU TI New Personal Author search New Subject search New Title search U> TEN -> ns You can keep browsing through this short display by typing "ns". Search request: FIND TW EXTINCTION SPECIES Search result: 13 records in the TEN-YEAR Catalog database 2. Cohn, Jeffrey P. The politics of extinction : [endangered species] / by Jeffrey P. Cohn. IN: Government executive. Vol. 22, no. 10 (Oct. 1990) UCB IGS R.R. Type choice, or type HELP for help, END to end session: NS SHO LON REV Next screen of Short display Different records in Short Long display Review display PA SU TI New Personal Author search New Subject search New Title search U> TEN -> rev Chapter 11: Accessing Library Catalogs Through the Internet NorthWestNet User Services Internet Resource Guide 114 Alternatively, MELVYL allows us to review all of the titles retrieved by our search request. When we type "rev"; the display looks like this: 1. Balancing on the brink of extinction : the Endangered .... 1991 2. COHN, Jeffrey P. The politics of extinctio ... 1990 3. EHRLICH, Paul R. Extinction : the causes a ... 1981 4. EHRLICH, Paul R Extinction : the causes a ... 1983 5. KELLY, Donald M. Near extinction : Califor ... 1990 6. LABASTILLE, Anne. Mama Poc : an ecologist's ... 1990 7. MYERS, Norman. Tackling mass extinction ... 1986 8. The Road to extinction : problems of categorizing the .. 1987 9. The Road to extinction : problems of categorizing the ...1987 10. Australia's endangered species : the extinction dilemma. 1990 11. AUSTRALIA. Endangered Species Advisory Committee. An Australian national strategy for the conservatio...1989 Type the numbers of the records you want to see in a LONG display, or type HELP. To see all the records, simply press RETURN. U> TEN -> 1 Now let's ask for a "LONG" display of item number 1 to see if it provides any clues about how we might refine the search. Search request: FIND TITLE WORDS EXTINCTION SPECIES Search result: 11 records in the TEN-YEAR Catalog database 1. Title: Description: Notes: Subjects: Other entries: Balancing on the brink of extinction : the Endangered Species Act and lessons for the future / edited by Kathryn A. Kohm. Washington, D.C. :Island Press, 1991. xi, 318 p. : ill., maps ; 24 cm. Includes bibliographical references and index. Endangered species -- Law and legislation -- United States. Kohm, Kathryn A. (Record 1 continues on the next screen.) Type choice, or type HELP for help, END to end session: NS SHO LON REV Next screen of Short display Different records in Short Long display Review display PA SU TI New Personal Author search New Subject search New Title search As you can see by looking at the subject line, this book is cataloged under the subject "endangered species." Chapter 11: Accessing Library Catalogs Through the Internet NorthWestNet User Services Internet Resource Guide 115 Step 8. Redefine and/or refine your search. Judging by the other titles in the list in Step 7, it appears that a subject search for "endangered species" will very likely be fruitful. U> TEN -> su endangered species Search request: FIND SU ENDANGERED SPECIES Search result: 520 records in the TEN-YEAR Catalog database 1. 1986 IUCN red list of threatened animals. 1986 2. 1988 IUCN red list of threatened animals. 1988 3. AAZPA manual of Federal wildlife regulations. 1985 4. Action plan for African primate conservation: 1986-90. 1985 5. ADAMS, Douglas, 1952Last chance to see. 1991 6. Alaska wildlife week unit : wildlife for the future. End... 1985 7. ALLEN, William B. 1928State lists of endangere... 1988 8. ANCONA, George. Turtle watch. 1987 9. The Animal finders' directory. 1985 10. Animal genetic resources : a global programme for sustai... 1990 11. Animals and plants listed as threatened (T) or endangere... 1988 12. ARNOLD, Richard A. Distribution, life histo... 1981 13. ARNOLD, Richard A. 1950Delta green gr (Elaphrus... 1985 ...(followed by 507 more titles!) MELVYL responds with 520 titles! Step 9. Repeat steps 3-8, in any order, for additional searches This is where the real power of using an OPAC starts; now that you've established a profitable search strategy and have some references upon which to base further searches, you can branch off to other related subject or title searches very easily. Chapter 11: Accessing Library Catalogs Through the Internet NorthWestNet User Services Internet Resource Guide 116 Step 10. End your OPAC and TELNET sessions. To leave MELVYL, type end: U> TEN -> end Thanks for using the MELVYL Online Catalog. Type LOGOFF and press RETURN to terminate your TELNET session. Press RETURN for the MELVYL catalog. U> logoff ELAPSED TIME = 0:11:53 END OF SESSION Connection closed by foreign host. Chapter 11: Accessing Library Catalogs Through the Internet NorthWestNet User Services Internet Resource Guide 117 FOR MORE INFORMATION ABOUT OPACS AND RELATED TOPICS Essential Documents For Using OPACs "Library Resources on the Internet: Strategies for Selection and Use" FTP Host: Directory: Filename: dla.ucop.edu pub/internet libcat-guide "Internet Accessible Library Catalogs & Databases," by Art St. George and Ron Larsen. FTP Host: Directory: Files: cerf.net.edu cerfnet/cerf_net/ internet-catalogs-08-91.txt internet-catalogs-04-91_apl.ps (text only) (apple.PostScript) Note that the filename contains the date the file was most recently updated. "OPACs in the UK: A list of interactive catalogues on JANET compiled for the Janet User Group for Libraries" FTP Host: Directory: Files: vaxb.acs.unt.edu library uk.lib (ASCII text) "University of North Texas' Accessing Online Bibliographic Databases," by Billy Barron. FTP Host: Directory: vaxb.acs.unt.edu library Files: libraries.ps libraries.txt libraries.wp (this directory contains many other useful files on OPACs) (PostScript version) (ASCII, text only version) (Word Perfect 5.0 version) Chapter 11: Accessing Library Catalogs Through the Internet NorthWestNet User Services Internet Resource Guide 118 Online Discussion Groups and Mailing Lists 1. As of September, 1991, there are at least 60 online discussion groups dealing with OPACs and related issues of information sciences. They range in coverage from discussion of a specific site's OPAC installations, to general discussion of present and future OPAC technology. A comprehensive and up-to-date list of these groups is included in the "Directory of Scholarly Electronic Conferences," by Diane K. Kovacs of Kent State University, available via FTP: FTP Host: Directory: Files: ksuvxa.kent.edu files are all in root directory, no need to cd ACADLIST.FILE1 ACADLIST.FILE2 ACADLIST.FILE3 ACADLIST.FILE4 ACADLIST.FILE5 ACADLIST.FILE6 ACADLIST.INDEX ACADLIST.README. As of September 1991, the "Libraries and Information Sciences" entries of the list are in the file ACADLIST.FILE2. However, you might as well get all 8 files; this is a tremendous resource, with information from many separate places put together in one large document in an easy to use structure. 2. NNSC Internet Resource Guide, "Chapter 2: Library Catalogs." As of September, 1991, about 30 libraries and library systems are described. Although these entries are largely rendered obsolete by the Barron and St. George /Larsen catalogs, they are still useful sometimes for supplemental information. For all of Chapter 2: FTP Host: Directory: Files: nnsc.nsf.net resource-guide chapter2-ps.tar.Z chapter2-txt.tar.Z (compressed and tarred PostScript) (compressed and tarred ASCII text) To obtain individual sections of Chapter 2, first FTP the Chapter 2 table of contents, and then FTP individual sections as desired: FTP Host: Directory: Files: nnsc.nsf.net resource-guide/chapter.2 intro.ps intro.txt section2-1.ps section2-1.txt (etc.) (PostScript table of contents) (ASCII text table of contents) (PostScript of section 2.1) (ASCII text of section 2.1) (etc.) Chapter 11: Accessing Library Catalogs Through the Internet NorthWestNet User Services Internet Resource Guide 119 Chapter 12: Internet Accessible Databases and Bibliographies WHAT IS INCLUDED IN THIS CHAPTER This document gives information on how to access many of the computers on the Internet which contain large databases. Of course, most computers contains large amounts of data. But in this chapter, databases are defined as "any highly structured repository of information whose contents you can access for your own analyses." This chapter is organized by major topics, so you can quickly and easily identify sources useful to your purposes. WHAT IS NOT INCLUDED HERE, AND WHERE TO FIND IT ❏ Online "White Pages" and "Yellow Pages" services which allow you to find individuals and organizations on the Internet are not included. Detailed descriptions of such services can be found in Chapter 14, "Internet Directory Services." ❏ Databases and information services which require special accounts on private computers, cost money to use, or can be purchased for local use are not included. Exceptions include a few "for fee" databases, in areas where free databases are not yet readily accessible. ❏ Many universities are currently implementing campus-wide information services. Although these information services are often treated as databases, they are usually used as directory services. ❏ In most of the NUSIRG, you have been provided with sample scripts to provide assistance or instruction in using a particular kind of resource. When there were a number of styles of user interface, our description focused on either a generic or common example. Unfortunately, there is such a tremendous variety of interfaces for these databases that a sample session would be of little value. DATABASES OF DATABASES It is possible that the Babel of databases interfaces will be rendered accessible through "databases of databases." In particular the Wide Area Information Service (WAIS) being developed by Thinking Machines Incorporated, has a great deal of promise for making a wide variety of Internet information services accessible through a single, easy-to-use interface. See Chapter 13 for more information about WAIS. Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide 120 WHAT YOU NEED TO USE INTERNET DATABASES ❏ ❏ A computer connected to the Internet; and An understanding of: ❏ e-mail: to send mail to Mailservers which will automatically mail help files, documents, or datasets; ❏ FTP: to access "file archives," and copy files to your own account; ❏ TELNET: to login into computers and run programs, search databases, and run simulations which could not be done on your own local computer. Read the appropriate chapter(s) from NUSIRG, or any other source of Internet information if any of these terms are unfamiliar to you. ORGANIZATION OF THE CHAPTER The entries in this chapter are organized by the following major subject categories: Multi-Disciplinary Databases Aeronautical Navigation Agriculture Area Studies Artificial Intelligence Astronomy / Space Science Census (US) Chemistry Computer Science Computer Software Ecology and Environment Education Genetics and Molecular Biology Geography Government and Politics Grants and Contracts History Mathematics Music Physics Statistics Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide 121 ORGANIZATION OF THE ENTRIES Each entry is coded in the following format (although not all entries contain every field): Official Acronym and Full Official Name of Database Audience: An estimation of who would most likely benefit from the database. Although most of these databases are not restricted in their access, not everybody would be able to use some data sets which are very large or require sophisticated processing or software. Contents: A brief description of contents relevant to the purposes of this chapter. Please note that many of these sources contain information above and beyond what is mentioned in this contents field. Comments: Additional things that you should know. Access: How to access the database via TELNET, FTP, mail-server, telephone, or postal mail. Contact: Official contact information if you have further questions [email protected] name postal mail address telephone number More Info: Pointers to official or more detailed descriptions, publications, online discussion groups, and other useful information. Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide 122 Multi-Disciplinary Databases CULDAT--Canadian Union List of Machine Readable Data Files Audience: Contents: Anyone Bibliographic and descriptive information about computer readable data files held by Canadian academic and governmental data libraries and archives. There are currently 1,417 databases accessible. Sources of databases searched in a CULDAT session include: CUSSDA: NAC: STC: UADL: UBCDL: UMISE: UWOSS: WATLS: YUISR: Access: Carleton University, Social Science Data Archive. National Archives of Canada. Statistics Canada. University of Alberta, Data Library. University of British Columbia, Data Library. University of Manitoba, Institute for Social and Economic Research. University of Western Ontario, Social Science Computing Laboratory. University of Waterloo, Leisure Studies Data Bank. York University, Institute for Social Research. Via Mailserver, which accepts Remote Spires (RMSPIRES) commands. Useful RMSPIRES commands to get you started include explain, find, browse, and display. For example: To get an overview of how to use CULDAT: mail: subject: message: rmspires%[email protected] (none needed) explain culdat To get an overview of the subjects covered by CULDAT datasets: mail: subject: message: rmspires%[email protected] (none needed) browse subject Contact: [email protected] Anna Bombak, Data Librarian 352 General Services Building University Computing Systems University of Alberta Edmonton, Alberta T6G 2H1 (403) 492-5212 National Archives Center for Electronic Records Audience: Contents: Access: Comments: Anyone. An archive of 10,000 datasets, with an emphasis on U.S. Government datasets. Particularly strong in health, demographic, and social science datasets. Currently, one must order copies of datasets on magnetic tape. By time you read this, it may be possible to obtain some or all of these datasets on floppy disks or via FTP or mail-servers. Contact CER for an update. Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide Contact: 123 For more information, or a free list of 4,000 Title List of Holdings Ted Hull [email protected]. The Center for Electronic Records Archives and Records Administration Washington, DC 20408 (202) 501-5579 More Info: There is a LISTSERV group called the "Federal Electronic Data Special Interest Group:" [email protected]@punfs.princeton.edu Free-Net Audience: Contents: Comments: Anyone Many informative files on health, education, politics, recreation, technology, etc. Free-Net is best described as an "open access community electronic information system" which, for registered users, also allows easy access to discussion groups including USENET. Free-Net uses a novel interface in which the user wanders through an "electronic city." Files are in "buildings," so for example, to get information on politics and government, one would enter the "City Hall." A rather extraordinary open access system which could be set up at other sites at very little cost. There are currently five sites using the Free-Net software, all in the midwestern United States, but many more are being established around the world as part of a notfor-profit cooperative network called "The National Public Telecommunications Network" (NPTN). When you first log in, you will be asked if you want to visit or register. Follow the instructions. As a visitor, your privileges in Free Net are restricted. If you register, you will be sent a registration packet through the mail, which you must fill out and return. Access: TELNET to: freenet-in-a.cwru.edu freenet-in-b.cwru.edu freenet-in-c.cwru.edu yfn.ysu.edu tso.uc.edu heartland.bradley.edu (Cleveland) (Youngstown, OH) (Cincinnati, OH) (Peoria, IL) Contact: e-mail: [email protected] T.M. Grundner, Ed.D President, NPTN Box 1987 Cleveland, Ohio 44106 (216) 368-2733 University of Maryland Info Database Audience: Contents: Anyone. Data and files on the following topics: Computers, Economics, Literature, Political Science, Meteorology, Area Studies, Electronic Journals. Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide 124 Comments: Files can be viewed online while using a menu driven TELNET session, or they can be copies locally by FTP. Although you can transfer files from within the interactive system, you are probably better off noting which files you want, and then copying from the FTP host. Access: For interactive sessions (highly recommended for browsing). TELNET: User Name: info.umd.edu INFO FTP Host: directory: info.umd.edu info Aeronautical Navigation NOAA Aeronautical Charting Data Sampler II Audience: Contents: Anyone, but the files are huge, and require extensive handling. Not recommended for trivial purposes. HUGE files containing data on the following: 1. 2. 3. 4. Comments: Access: Aeronautical Chart Automation Section (ACAS) data files (containing data on 17,000 airports, 21,000 runways, 46,000 obstructions to air navigation, navigational aid data, and ARTCC data for low and high air routes); COMPSYS Distance and Bearing Software (used by National Airspace System for computing reporting points, intersections, and other fixes); Special Use Airspace Data Files (used to inform pilots of restricted and prohibited airspace); Advanced Automation System (AAS) Data. NOT TO BE USED FOR NAVIGATION! For learning only. For MS/DOS computers only. Requires at least 120 Mb hard drive. These data, and the associated programs are from a CDROM. If you have a CD-ROM reader, you are probably better off obtaining the CD than using the FTP'able data. Accessible by FTP. FTP Host: Directory: Files: Contact: hobbes.ksu.ksu.edu pub/noaa instal.bat data/*.*.* noaa/*.*.* instal/*.* (a DOS batch file for installation (10Mb compressed 62Mb uncompressed (12Mb compressed 36Mb uncompressed (1Mb) This contact information is for the CD-ROM, not the FTP'able dataset. CD-ROM Project Director, Requirements & Technology Staff NOAA, National Ocean Service 6010 Executive Blvd., Room 1022, N/CG3x22 Rockville, MD 20852 (301) 443-8323 More Info: FTP Host: hobbes.ksu.ksu.edu Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide Directory: File: 125 pub/noaa readme.doc Agriculture PENpages Audience: Contents: Comments: Access: Anyone. Online articles and brochures on agriculture, careers, health, consumer issues, weather, from The Pennsylvania State Department of Agriculture, Pennsylvania State University College of Agriculture, and Rutgers University. Highly accessible, general information. Not a research oriented service; vt100 terminal emulation recommended. Accessible by TELNET TELNET: Login: psupen.psu.edu PNOTPA Contact: e-mail: [email protected] Art Hussey, Assistant Director Computer Services Office of Administrative Services The Pennsylvania State University 405 Agricultural Administration Building University Park, PA 16802 (814) 863-3449 More Info: NNSC Internet Resources Guide, Section 3.14 PENpages User Guide: online, or request from above address. Area Studies INFO-SOUTH Latin American Information System Audience: Contents: Access: Anyone but a subscription charge is required. Very extensive listings of citations and abstracts on a wide variety of Latin America issues. Accessible by TELNET: TELNET: Contact: sabio.ir.miami.edu e-mail: [email protected] INFO-SOUTH Latin American Information System Institute of Interamerican Studies / North-South Center Graduate School of International Studies PO Box 248014 Coral Gables, FL 33124-3211 tel: (305) 284-4414 More Info: NNSC Internet Resources Guide, Section 3.22 Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide 126 Latin American Data Base (LADB) Audience: Contents: Comments: Access: Contact: Anyone interested in accessing current information originating directly from Latin America. 11,000 articles from 1987 to the present organized under the following titles: "Chronicle of Latin American Economic Affairs," "Central America Update," and "SOURCEMEX--Economic News and Analysis on Mexico." Hundreds of new articles added each month. You must contact LADB (see below) to arrange access. Once you have contacted the LADB, you can access LADB through the Internet or by a modem call to an 800 number. To establish access, contact: Roma Arellano [email protected] Latin American Institute University of New Mexico 801 Yale NE Albuquerque, NM 87131-1016 (505) 277-6839 More Info: NNSC Internet Resources Guide, Section 3.26. There is a special LISTSERV list devoted to discussion about this database: [email protected]%umrvmb.umr.edu Artificial Intelligence Bibliographic Mailserver for Artificial Intelligence Literature Audience: Contents: Comments: Access: Researchers in Artificial Intelligence. Bibliographies of artificial intelligence literature, currently containing more than 20,000 references. Most appropriate for researchers already very familiar with Artificial Intelligence. This data set is not well-suited for casual browsing. Via a mailserver. The host machine is in Germany, so if your primary language is English, you need to specify that output be sent to you in English. Mailserver: Subject: Contact: [email protected] lidosearch info english [email protected] Dr. Alfred Kobsa Department of Information Science University of Konstanz D-W-7750 Konstanz 1 Germany tel: (+49) 7531 88 1 More Info: NNSC Internet Resources Guide, Section 3.29 Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide 127 University of California at Irvine Repository Of Machine Learning Databases and Domain Theories Contents: Contents: Access: Contact: 75 databases and domain theories useful for evaluating learning algorithms. The dataset files are divided into two parts: filename.data (which contains raw data), and filename.names, which contains documentation about the dataset file. Some of the files in the archive are not datasets, but rather generate datasets. All files can be freely copied to your own computer for use. Accessible by FTP and an e-mail server. FTP Host: directory: ics.uci.edu pub/machine-learning-databases mail: subject: message: [email protected] (none needed) help [email protected] [email protected] Astronomy / Space Science Astronomers Audience: Contents: Comments: Access: Professional Astronomers. Contact information for astronomers and astronomical facilities around the world Not to be used for trivial or commercial purposes. Send an e-mail request for this guide to: [email protected] Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide 128 NED--NASA / IPAC Extragalactic Database Audience: Contents: Comments: Access: Anyone. Extensive information on 132,000 extragalactic objects (galaxies, quasars, infrared and radio sources), and software to search raw data and associated bibliographies. Includes an online tutorial. Much of the software and some of the data are available for local use from the FTP host (see More Info) Accessible through TELNET. TELNET: login: Contact: ipac.caltech.edu ned [email protected] NED c/o IPAC MS 100-22 California Institute of Technology Pasadena, CA 91125 (818) 584-2903 More Info: Extensive online help. FTP Host: files: ipac.caltech.edu README files in various directories NNSC Internet Resources Guide, Section 3.21 NSSDC--National Space Science Data Center Audience: Contents: Comments: Access: Anyone. Official clearinghouse for NASA data, containing a directory of publicly available data. Datasets referenced by this service include: Global change datasets; Nimbus-7 GRID TOMS data; Interplanetary Medium Data (OMN); Geophysical Models; International Ultraviolet Explorer Data; Voyager and other planetary images; Earth observation data; Star catalogs. The TELNET front end also allows access to the Standards and Technology Information System, back issues of CANOPUS newsletters, etc. Although the data must be purchased (on CD-ROM, diskette, or magnetic tape) the prices are not high considering the amount and quality of data available (for example, a set 8 CDs of Voyager images is $ 75). You can set up an official account with user-id and password if you plan to use NODIS more than once. Accessible through TELNET. TELNET: login: Contact: nssdca.gsfc.nasa.gov nodis [email protected] National Space Science Data Center Request Coordination Office Goddard Space Flight Center Code 633 Greenbelt, MD 20771 Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide 129 (301) 286-6695 SDDAS--Southwest Research Data Display and Analysis System Audience: Contents: Comments: Access: Anyone doing research in space, magnetosphere or upper atmospheric physics. Data from upper atmosphere collected from a number of satellites (currently, Dynamic Explorers 1 and 2, UARS Partial Environment Monitor, and TSS-1 ROPE). Although anyone can "take it for a spin," real use requires authorization from the contact person listed below. The service is menu driven and easy to use. If you are using certain graphics terminals, this service allows you to view many of the datasets in sophisticated graphical displays. Accessible through TELNET. TELNET: Contact: espsun.space.swri.edu 540 [email protected] Dr. J.D. Winningham Southwest Research Institute Division of Instrumentation and Space Sciences P.O. Drawer 28510 San Antonio, TX 78228-0510 (512) 522-3259 More Info: NNSC Internet Resources Guide, Section 3.7 Online, menu driven help User's Guide mailed to authorized users Detailed listing of data holdings can be requested from: [email protected] SIMBAD--Set of Identifications, Measurements, and Bibliography for Astronomical Data Audience: Contents: Comments: Access: Contact: Astronomers with NASA or NSF contracts. Data and bibliographic entries for stars and subsets of non-stellar objects This service may become available via a CREN mail server in the near future, which is why it is included in this general listing. Accessible through TELNET, but one must have an account. [email protected] SIMBAD c/o Computation Facility Smithsonian Astrophysical Laboratory 60 Garden St., MS 39 Cambridge, MA 02138 (617) 495-7301 More Info: NNSC Internet Resources Guide, Section 3.5 SPACELINK Audience: Anyone. Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide Contents: Comments: Access: 130 Database and interactive system containing information about NASA and NASA activities. A large number of possible curricular activities for elementary and secondary science classes. A tremendously valuable resource for elementary and secondary science teachers. Very easy to use. In your first TELNET session, you will be prompted to create a unique user-id and password for subsequent sessions. Files of interest can be downloaded either during an interactive TELNET session, or by accessing the FTP file archives. Accessible by TELNET and FTP. TELNET: user-id: password: 128.158.13.250 newuser newuser FTP Host: directory: ames.arc.nasa.gov pub/SPACE/SPACELINK FTP Host: directory: file: ames.arc.nasa.gov pub/SPACE/SPACELINK Spacelink.index More Info: Yale Bright Star Catalog Audience: Contents: Comments: Access: Anyone. Machine-readable version of the 4th Edition of the Yale Bright Star Catalog, including such variables as photoelectric magnitudes, MK spectral types, parallaxed, and radial velocity comments (indication and identification fo spectroscopic and occulation binaries), projected rotational velocities, variability, spectral characteristics, duplicity, and group membership These files are set up for MS-DOS microcomputers. Accessible through FTP. For a version usable with MS-DOS computers: FTP Host: directory: files: pomona.claremont.edu yale_bsc all files in the directory For a version usable by Unix computers: FTP Host: directory: files: Contact: More Info: mandarin.mit.edu astro/data.etc/yale.bright/starchart all files [email protected] FTP Host: directory: files: pomona.claremont.edu yale_bsc read.me yaleread.me Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide 131 Census Data Michigan Archives of 1990 Census of Population and Housing Audience: Contents: Comments: Access: Anyone. Michigan Census data includes summaries of summary tape files for states, counties, and places; publication programs of all papers and electronic products from the 1990 U.S. Census; guides to census questionnaires and geographic concepts used by the U.S. Census Bureau; guides to using CD-ROM disks of the PL94-171 datasets. This is a slightly unusual FTP host. To enter the Census directory, issue "cd lelf:" --be sure to include the ":"! The basic FTP commands, such as "dir" and "get", will then work. Accessible through FTP. FTP Host: directory files: Contact: ub.cc.umich.edu lelf: all files in the directory (be sure to include the ":"!) [email protected] Grace York Documents Center University of Michigan Ann Arbor, MI (313) 764-0410 More Info: FTP Host: files: ub.cc.umich.edu lelf:census lelf:cenguide (directory of available files) (guide to census, etc.) Chemistry IuBIO--Indiana University Archive for Molecular and General Biology Audience: Contents: Comments: Access: Anyone. Chemistry software for DOS, MAC, etc. Getting the document "Archive.doc" via FTP will make it easier for you to use this service. Accessible through FTP FTP Host: Contact: ftp.bio.indiana.edu [email protected] Don Gilbert BioComputing Office Biology Department Indiana University Bloomington, IN 47405 More Info: NNSC Internet Resources Guide, Section 3.13. Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide FTP Host: Files: 132 ftp.bio.indiana.edu Archive.doc Computer Software General Information about Computer Software Databases There are countless archives of computer software available through the Internet. This section is not meant to be a comprehensive listing. Computer Software (General Purpose Archives) Washington University Public Domain Archives Audience: Contents: Comments: Access: Anyone. An immense quantity of public domain and shareware software for the Amiga, Apple II, Atari, CP/M, DOS, GNU, Macintosh, Sun, TeX, Unix, VAX/VMS, X Windows operating environments. This server "mirrors" a number of other FTP hosts around the world. When mirrored archives receive new information, it is sent also to WUARCHIVE. The archive also contains files besides computer software, but software is its main strength. A simple listing of just the filenames contained in this archive is over 7 megabytes in size. To use this archive effectively, it is crucial that you get the README files for each directory whose contents you want to explore. We recommend that you follow the suggestions provided in these README files. Accessible through FTP. FTP Host: Contact: wuarchive.wustl.edu [email protected] Washington University Office of the Network Coordinator One Brookings Drive Campus Box 1045 St. Louis, MO 63130-4899 COSMIC Audience: Contents: Comments: Access: Contact: U.S. citizens (with occasional exceptions). Computer software for a wide variety of applications and operating systems created under projects funded by NASA (thus the restriction to U.S. citizens). The COSMIC staff can also perform searches through the COSMIC database to locate programs appropriate to your interests and needs. Most of the software must be purchased. E-mail requests for information only. [email protected] COSMIC Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide 133 The University of Georgia 382 East Broad Street Athens, GA 30602 (404) 542-3265 More Info: NNSC Internet Resources Guide, Section 3.12. Computer Software (Operating System Specific) SUPERSFT--IBM Supercomputing Program Database Audience: Contents: Comments: Access: Anyone. Catalog of programs suitable for use on IBM supercomputers using vector or parallel processing. The actual programs are not available through this service. If you have written such programs, you can submit information about your program for inclusion in the catalog. Via a LISTSERVer, send e-mail to: [email protected] With one of the following in the body of the message: get supersft help get supersft index get filename filetype Contact: (to get supersft help) (for an index of files) (to obtain a particular (file of interest from (the supersft index list) [email protected] Supercomputing Support Office University of Illinois at Chicago Computer Center (mail code 135) Box 6998 Chicago, IL 60680 (312) 996-2981 More Info: NNSC Internet Resources Guide, Section 3.8 VxWorks Users Group Archives Audience: Contents: Access: Anyone using or interested in the VxWorks operating environment. VxWorks programs and information. Accessible through FTP and e-mail server. FTP Host: directories: thor.atd.ucar.edu pub/vx pub/unix Mailserver: subject: [email protected] (none needed) Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide message: Contact: 134 send index [email protected] Richard Neitzel National Center for Atmospheric Research Box 3000 Marshall Field Site Boulder, CO 80307 (303) 497-2057 or (303) 497-2060 Ecology and Environment General Information about Ecological and Environmental Databases A new printed periodical called "The Green Library Journal: Environmental Topics in the Information World" aims to disseminate information about environmental databases and international environmental information centers. For more information about "The Green Library Journal," contact: [email protected] Maria Jankowska, Editor Green Library Journal University of Idaho Library Moscow, Idaho, U.S.A. 83843-4198 (208) 885-6260 Fax: (208) 885-6817 CEAM--Center for Exposure Assessment Modeling Audience: Contents: Comments: Access: Contact: Anybody interested in environmental simulation models Environmental simulation models for: urban and rural non-point sources, conventional and toxic pollution of streams, lakes and estuaries, tidal hydrodynamics, geochemical equilibrium, and aquatic food chain bioaccumulation. CEAM is not on the Internet, yet, but might be by time you read this. All software is in the public domain. Modem calls to CEAM Bulletin Board Service: (404) 546-3402. [email protected] Jim Fuller Center for Exposure Assessment Modeling Environmental Research Laboratories U.S. Environmental Protection Agency Athens, GA 30613 Environmental Exchange Audience: Contents: Anyone. Database of environmental issues including air and water quality, land-use, energy, waste, wildlife and environmental education programs. Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide Comments: Access: Contact: 135 ECIX is supported by the Joyce Mertz-Gilmore Foundation and the Energy Foundation. Contact Environmental Exchange for information. [email protected] The Environmental Exchange 1930 18th St. NW Suite 24, Washington, DC 20009 (202) 387-2182 Education Online Database for Distance Education Audience: Contents: Comments: Access: Anyone. Information on education through computer networks. Subscription charges may be levied as of 1992. From the U.S., one must go through the Internet / Janet gateway TELNET server, so there are considerably more prompts than you have encountered in within Internet TELNET. Note that once you are at the hostname prompt, you have access to many other Janet resources as well. TELNET: login: hostname: User name: Your name: Inst.: Contact: sun.nsf.ac.uk janet uk.ac.open.acs.vax ICDL your name your institutional affiliation [email protected], or [email protected] ICDL c/o The Open University, Walton Hall Milton Keynes, MK7 6AA United Kingdom tel: (+44 908) 653537 More Info: NNSC Internet Resources Guide, Section 3.28. Genetics and Molecular Biology General Information about Genetics and Molecular Biology Databases If you intend to use any of the Genetics and Molecular Biology databases listed in this section, you are advised to get the LiMB database to get an overview of what is available. Most, but not all, of the databases in this section are described in LiMB, which is constantly kept up to date. LiMB Database--Listing of Molecular Biology Databases Audience: Contents: Anyone. A Database of Molecular Biology Databases LiMB. Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide Comments: Access: 136 The essential resource for anyone using, or thinking of using, Genetic and Molecular Biology Databases. If you are creating such a database, these are the people to notify to be sure of broad notification in the Molecular Biology community. The LiMB database of databases can be obtained either by sending a mail request to an electronic mail server, or by getting the file by FTP: Electronic Mail Server requests: mail: subject: message: [email protected] (none needed) limb-data FTP source (one of several) FTP Host: directory: file: Contact: ncbi.nlm.nih.gov repository/LiMB limb [email protected] LiMB T-10, Mail Stop k710 Los Alamos National Laboratory Los Alamos, NM 87545 (505) 665-3493 More Info: FTP Host: directory: file: ncbi.nlm.nih.gov repository/LiMB README Bibliography of Theoretical Population Genetics Audience: Contents: Comments: Access: Anyone. A comprehensive bibliographic listing of articles on theoretical population genetics. The two letters at ends of filenames indicate the range of primary author's last names in citations contained in each file; e.g., "bible.ac" contains references from authors whose names begin with "Aa" to "Ce." Accessible through FTP. FTP Host: directory: files: Contact: evolution.genetics.washington.edu bible bible.ac bible.cf bible.fh bible.hl bible.lm bible.mr bible.rs bible.sz [email protected] Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide 137 Joe Felsenstein Department of Genetics SK-50 University of Washington Seattle, WA 98195 ENZYME Audience: Contents: Comments: Access: Contact: Anyone. Dictionary of 3072 enzymes; contains nomenclature, information about catalytic activity, cofactors, diseases associated with the enzyme. Cross references to the SWISS-PROT dataset. Version 7.0 will be available November, 1991. Accessible through FTP and e-mail server. FTP Host: directory: files: ncbi.nlm.nih.gov repository/ENZYME enzyme.dat enzyme.asn Mailservers: [email protected] genbank.bio.net [email protected] Amos Bairoch Medical Biochemistry Department Centre Medical Universitaire 1211 Geneva 4 Switzerland tel: (+41 22) 61 84 92 More Info: Users Guide. FTP Host: directory: file: ncbi.nlm.hnih.gov repository/ENZYME enzuser.txt Gene-Server Audience: Contents: Access: Molecular Biologists / Geneticists. A huge number of software programs for molecular biologists and Geneticist, and several databases including: GenBank; PIR protein sequences; R. Roberts Restriction Enzyme Database; and Matrix of Biological Knowledge Archive Server files Mail server: mail: subject: message: Contact: [email protected] (none needed) send help [email protected] Dan Davison Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide 138 (713) 749-2801 More Info: NNSC Internet Resources Guide, Section 3.1. IuBIO--Indiana University Archive for Molecular and General Biology Audience: Contents: Comments: Access: Anyone. Molecular biology software for a variety of operating systems and data (particularly Drosophila genetics). Getting the document "Archive.doc" via FTP will make it easier for you to use this service. Accessible through FTP. FTP Host: Contact: ftp.bio.indiana.edu [email protected] Don Gilbert BioComputing Office Biology Department Indiana University Bloomington, IN 47405 More Info: NNSC Internet Resources Guide, Section 3.13 FTP Host: files: ftp.bio.indiana.edu Archive.doc Johns Hopkins Genetic Databases Audience: Comments: Contents: Access: Anyone. You must register first with the contact person listed below for a user-id and password. Online data from "Mendelian Inheritance in Man". Accessible through TELNET. TELNET: welch.jhu.edu Contact: [email protected] GDB/OMIM User Support William H. Welch Medical Library 1830 E. Monument St. Third Floor Baltimore, MD 21205 (301) 955-7058 MBCRR--Molecular Biology Computer Research Resource Audience: Contents: Access: Anyone. Source code and documentation for DNA and protein sequence analysis software for Unix. Accessible through FTP FTP Host: mbcrr.harvard.edu Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide directory: Contact: 139 MBCRR-Package [email protected] MBCRR, LG-S127 44 Binney St., Boston. MA 02115 (617) 732-3746 More Info: NNSC Internet Resources Guide, Section 3.20. FTP Host: directory: file: mbcrr.harvard.edu MBCRR-Package README PROSITE Audience: Contents: Access: Anyone, but most useful to molecular and structural biologists. Dictionary of protein sites and patterns. Accessible through FTP. FTP Hosts: directory: file: ncbi.nlm.nih.gov repository/PROSITE prosite.dat Contact: [email protected] Amos Bairoch Medical Biochemistry Department Centre Medical Universitaire 1211 Geneva 4 Switzerland tel: (+41 22) 61 84 92 More Info: Bairoch, A., 1991, Nucleic Acids Research 19:2241-2245. Handbook and User Manual FTP Hosts: directory: files: ncbi.nlm.nih.gov pub/prosite prosite.txt prosite.doc (Users Manual) (Handbook) SEQANALREF Audience: Contents: Comments: Access: Anyone. DNA sequence analysis bibliography containing 1657 references. Version 21.0 available in October, 1991. Accessible through FTP. FTP Hosts: directory: files: ncbi.nlm.nih.gov repository/SEQANALREF seqanalr.dat seqanalr.txt (the bibliography) (a help file) Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide Contact: 140 [email protected] Amos Bairoch Medical Biochemistry Department Centre Medical Universitaire 1211 Geneva 4 Switzerland tel: (+41 22) 61 84 92 More Info: Bairoch A. 1991. SEQANALREF: a sequence analysis bibliographic reference data bank. CABIOS 7:268-268(1991). SWISS-PROT Audience: Contents: Comments: Access: Anyone. Protein sequence data bank containing 21,795 sequences and 21,773 references. Release 20.0 will be available in November, 1991; tape and CD ROM distribution in late 1991. Accessible through FTP. FTP Hosts: directory: file: Contact: ncbi.nlm.nih.gov repository/SWISS-PROT userman.txt (ASCII users manual) [email protected] Amos Bairoch Medical Biochemistry Department Centre Medical Universitaire 1211 Geneva 4 Switzerland tel: (+41 22) 61 84 92 More Info: Bairoch A., Boeckmann B.; Nucleic Acids Res. 19:2247- 2249(1991). Geography Geographic Name Server Audience: Contents: Comments: Access: Anyone, but please do not use frivolously! Currently, geographic information for U.S. cities, counties, states as well as some natural features taken from the U.S. Geodetic Survey, and the U.S. Postal Service. There are plans for worldwide coverage. Variables stored include names, elevation, latitude, longitude, population, telephone area code and FIPS codes where appropriate. The output from this program is most easily used as input for other software packages. TELNET. telnet martini.eecs.umich.edu 3000 Contact: Tom Libert [email protected] (313) 936-3000 Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide 141 Government and Politics U.S. Senate Bibliographies Audience: Contents: Comments: Access: Contact: Anyone. Bibliographies of U.S. Senate Committee hearings and publications for the 99th-102nd Congresses. Filenames in the database have a very particular way of being put together which you should understood before using the database. Be sure to obtain the file readme.gwp9108 which explains these formats. Accessible through FTP and e-mail server. FTP Host: directory: file: ncsuvm.cc.ncsu.edu senate readme.gwp9108 (basic information file; the last four numbers represent year & month of file version) e-mail: subject: message: [email protected] (none needed) get readme gwp9108 senate floppy disks by mail John A. McGeachy Documents Department D.H. Hill Library, North Carolina State University Raleigh, NC 27695-7111 (919) 515-3280 Grants and Contracts STIS--Science and Technology Information System (NNSC) Audience: Contents: Comments: Access: Anyone. National Science Foundation publications, including NSF Bulletin, Guide to NSF Programs, grants booklet including application forms, grants program announcements, press releases, NSF telephone book, reports of National Science Board, abstracts and descriptions of research projects currently funded by NSF, and analytical reports and news from the International Programs division. TELNET and modem service features prompts and full screen menus, online viewing of documents, database search utilities, provisions for downloading, and tutorial. STIS can be used through FTP, TELNET, or dial in calls by modem: FTP Host: directory: files: stis.nsf.gov all directories all files Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide 142 TELNET: login: stis.nsf.gov public MODEM CALL: (202) 357-0359, or (202) 357-0360 Terminal emulation settings should be term=VT100, parity=even, data bits=7, duplex=full. Contact: [email protected] Dr. STIS National Science Foundation Office of Information Systems, Room 401 1800 G. Street, N.W. Washington, D.C. 20550 (202) 357-7555 More Info: Online help during TELNET sessions. STIS Manual, available from: FTP Host: files: stis.nsf.gov stishelp.man stishelp.wp5 (ASCII format) (WordPerfect 5 format) History General Information about History Databases The FTP host ra.msstate.edu contains a great deal of information about history databases. This is a very good source to check periodically if you want to keep abreast of developments in history databases. The directory listed below also contains many online archives, articles, bibliographies, and other electronic documents. The archives are maintained by Don Mabry of Mississippi State University. FTP Host: directory: ra.msstate.edu pub/docs/history (contains many directories holding files of interest to historians) MEMDB (Medieval and Early Modern Data Bank) Audience: Contents: Comments: Access: Contacts: Contact MEMDB. Data on western Europe between 800-1800 A.D. One must pay subscription fees to RLIN Through Research Libraries Group, Inc. MEMDB:The Medieval and Early Modern Data Bank Department of History CN 5059 Rutgers, The State University of New Jersey New Brunswick, NJ 08903 Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide 143 RLIN: RLIN Information Center Research Libraries Group, Inc. 1200 Villa St. Mountain View, CA 94041-1100 More Info: NNSC Internet Resources Guide, Section 3.3 (MEMDB) NNSC Internet Resources Guide, Section 2.4 (RLIN) Literature Dartmouth Dante Project Audience: Contents: Comments: Access: Anyone. A database containing the text of Dante's "Divina Commedia" and full texts of 600 years of scholarly commentary on the work. The database uses the BRS/Search program. Currently, 46 of 60 planned commentaries has been installed. Online help, and printed user manual for $4.00 Note that many of the commentaries are copyrighted, so the database itself cannot be distributed. Available 24 hours a day, except for Monday, 4:15-6:30 am Eastern Time. Internet access via TELNET or modem: TELNET: library.dartmouth.edu (or 129.170.16.11) modem access: (603) 643-6300 (300 and 1200 baud) (603) 643-6310 (> 1200 baud) After connecting by either TELNET or modem, supply terminal emulation information ("unknown" will work for most sessions); when you see the "->" prompt, type: connect dante to connect to the Dante Database. Contact: [email protected] Dartmouth Dante Project 1 Reed Hall HB 6087 Dartmouth College Hanover, NH 03755 (603) 646-2633 Mathematics MATLAB User Group Archive Audience: Contents: Anyone interested in or using the MATLAB numeric computation system. MATLAB functions and utilities. Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide Comments: Access: These MATLAB files are also accessible from NETLIB (please see next entry). If you choose not to use NETLIB, you are encouraged to subscribe to the MATLAB users digest by sending a subscription request, including your e-mail user-id and address, to: [email protected] Via e-mail server: mail: subject: message: Contact: 144 [email protected] (none needed) send index from matlab [email protected] Christian Bischoff Math and Computer Sciences Division Argonne National Labs Argonne, IL 60439 (708) 972-8875 More Info: NNSC Internet Resources Guide, Section 3.18. To subscribe to the MATLAB user's digest, send a request including you user-id and e-mail address to: [email protected] Netlib Mathematical Software Distribution System Audience: Contents: Comments: Access: Anyone using or writing mathematical software. Library of mathematical software and algorithms; also a menu driven service called "walk" which allows one to find the appropriate algorithm for a particular purpose. A tremendously valuable resource. Accessible through FTP, e-mail server, TELNET, and modem. FTP Host: login: directory: research.att.com netlib all Mail-server Access: North American users should send mail to [email protected] or [email protected] subject: message: (none needed) send index TELNET: login: research.att.com walk Modem Access: (908) 582-1238 login: walk Contact: Eric Grosse, AT&T Bell Labs 2t-504, Murray Hill, NJ 07974 Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide e-mail: tel: 145 [email protected] (908) 582-5828 Maple FTP Archives Audience: Contents: Access: Anyone using or interested in Maple mathematical software. Maple software tools. Accessible through FTP. FTP Hosts: 129.132.101.33 (neptune) ETH Zurich, Switzerland 129.97.128.58 University of Waterloo, Canada Mathematica FTP archives Audience: Contents: Access: Anyone using or interested in the Mathematica software package. Mathematica software tools. Accessible through FTP. FTP Hosts: otter.stanford.edu ftp.ncsa.uiuc.edu nic.funet.fi fenris.claremont.edu siam.unibe.ch vax.eedsp.gatech.edu Music Music and Lyrics Archives Audience: Contents: Comments: Access: Anyone. Lyrics for thousands of contemporary rock albums, discographies and commentary on the classical music repertoire. There is a directory to receive contributions to the archive (pub/tmp/incoming). Accessible through FTP. FTP Host: directory: file: Contact: vacs.uwp.edu pub/lyrics files.directory [email protected] Physics PINET--Physics Information Network. Audience: Contents: Comments: Access: Registered users. SPIN and General Physics Advanced Abstracts, bibliographic databases, job announcements, AIP meetings, news releases, and announcements, ordering of AIP publications. This is a for fee service which requires an initial registration fee, and hourly connect charges. Accessible through TELNET TELNET: pinet.aip.org Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide 146 Statistics Statlib Statistical Software and Data Distribution System Audience: Contents: Access: Anyone. Statistical software, algorithms, datasets, directory of statisticians. Statlib is accessible via FTP and e-mail server. FTP Host: login name: password: lib.stat.cmu.edu statlib your-e-mail-address Mail server: subject: message: [email protected] (none needed) send index Statlib will send a file containing information about the contents of the archives, and more detailed instructions on how to use the mailserver. Contact: Michael Meyer [email protected] Department of Statistics Carnegie Mellon University Pittsburgh PA, 15213 (412) 268-3108 More Info: NNSC Internet Resources Guide, Section 3.19. Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide 147 For More Information about Internet Databases and Bibliographies Databases as Sources of Information about Databases If there are databases in this chapter which are of special interest to you, you can communicate with their appropriate contact people for information to determine what other related databases exist or are being planned. In many cases, the databases listed in this chapter contain many pointers to other related databases (for example, the History archives at Mississippi State University provides information on a wide variety of history-specific sources throughout the world). Fellow Internet Users and Peers as Sources of Information about Databases If you are interested in particular classes of databases, you are advised to subscribe to some of the more quantitatively oriented Internet discussion groups to keep up to date on what databases are available to researchers in your field -- in fact, much of the information about online databases provided in this chapter was collected by following up on postings to discipline specific LISTSERV and USENET discussion groups. Refer to Section 3 of NUSIRG for more information on using LISTSERV and USENET, and how to determine what discussion groups are most appropriate for your needs. Other Printed Compendia of Internet Databases Chapter 2 of the following source contains continually updated information about a variety of Internet databases and bibliographies: NSF Network Service Center. (1988 - ). Internet Resource Guide. NSF Network Service Center, Cambridge, MA FTP Host: directory: files: nnsc.nsf.net resource-guide chapter2-ps.tar.Z (compressed and archived PostScript version of Chapter 2 chapter2.txt.tar.Z (compressed and archived ASCII version of Chapter 2. Chapter 2 of the following printed document provides detailed information about 10 Internet databases: NYSERNet, Inc. 1991. NYSERNet New User's Guide to Useful and Unique Resources on the Internet. NYSERNet, Inc. Syracuse, NY. Chapter 12: Internet Accessible Databases and Bibliographies NorthWestNet User Services Internet Resource Guide 148 Chapter 13: WAIS ( Wide Area Information Server ) : An Interface to Databases WHAT IS WAIS? WAIS is an innovative "information server" program which allows you to search diverse databases on the Internet from a single, easy-to-use interface. For example, WAIS currently allows you to: ❏ ❏ ❏ ❏ ❏ read newspapers, get information on any country in the world, scan many specialized databases, get information about the Internet, and much more. HOW WAIS WORKS All versions of WAIS operate in the same way. WAIS runs on a "client" machine, such as a Macintosh connected to the Internet, and queries "server" machines which contain the actual databases (such as a Connection Machine in Cambridge, MA). The WAIS client presents a uniform search interface, and translates the user's request into a syntax understood by the various servers. You don't need to know anything about the various query languages of the server databases to use WAIS. WAIS is particularly adept at handling complex textual information. It can search through many large documents for the occurrence of keywords, and list which documents are of relevance to your query. Each document gets a score, ranging from 1-1000, for how well the document corresponds to what you want to find (with 1000 being deemed a "perfect fit"). The criteria by which WAIS determines relevance of documents can be modified to customize searches even more closely to the user's needs. This customization process uses a method called "relevance feedback." One of the many exciting possibilities opened up by WAIS and related Information Servers is that you can create a "Personal Electronic Newspaper." You can have WAIS automatically pull all items of interest together into a single document monthly, weekly, or even daily. There are versions of WAIS available for the Mac, Unix computers, X-window terminals, and VMS. If you want to install a copy of WAIS on your own system, read the section "How to Get a Copy of WAIS" at the end of this document. Chapter 13: WAIS (Wide Area Information Server): An Interface to Databases NorthWestNet User Services Internet Resource Guide 149 FOR CURRENT INFORMATION ABOUT WAIS WAIS is so new and rapidly evolving that this document will probably be out of date by time you read it. There will probably be hundreds of WAIS clients running on many different Internet hosts with access to hundreds of databases. If you want to use or learn more about WAIS you are strongly encouraged to subscribe to one of the WAIS discussion groups or mailing listed at the end of this document to keep posted on the rapid development of this exciting new Internet resource. USING WAIS To illustrate the use of WAIS, we will show a session using the SWAIS program, which is a generally accessible and easily used implementation of WAIS on the Internet. Note that many of the details of using WAIS would be different on Mac or X-windows based implementations, which make extensive use of icons and the mouse. SWAIS is one of several interactive, window oriented versions of WAIS. WAIS can also be run as a command line program which allows much more powerful and automated searching of server databases. A SAMPLE WAIS SESSION USING "SWAIS" To use the SWAIS version of WAIS you should use full screen terminal emulation, such as vt100. Ask your local user service staff or instructor if you need help. Lines preceded by U> indicate lines on which you enter commands; lines preceded by W> indicate responses from WAIS. Boxes represent screens you will see, in whole or in part, during your SWAIS session. To get started, just TELNET to quake.think.com: U> telnet quake.think.com W> SunOS UNIX (quake.think.com) U> LOGIN: wais U> TERM = (unknown) vt100 If you have specified a full screen terminal type, such as vt100, you should now see something like the following on your screen: Chapter 13: WAIS (Wide Area Information Server): An Interface to Databases NorthWestNet User Services Internet Resource Guide SWAIS Source Selection # 01: 02: 03: 04: 05: 06: 07: 08: 09: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 150 Server [ [ [ [ [ [ [ [ [ [ [ [ [ [ [ [ [ [ [ quake.think.com] hub.nnsc.nsf.net] hub.nnsc.nsf.net] quake.think.com] cmns.think.com] quake.think.com] cossack.cosmic.uga.e] cossack.cosmic.uga.e] wais.eff.org] sol.acs.unt.edu] microworld.media.mit] cmns.think.com] cmns.think.com] cmns.think.com] cmns.think.com] hub.nnsc.nsf.net] cmns.think.com] quake.think.com] cmns.think.com] Sources:24 Source Cost directory-of-servers ietf-documents internet-drafts internet-rfcs info-mac US-Gov-Programs Cosmic-abstracts Cosmic-programs eff-documents online-libraries poetry wall-street-journal world-factbook usenet-cookbook sun-mail internet-phonebook risk-digest sample-books sample-patents Free Free Free Free Free Free Free Free Free Free Free Free Free Free Free Free Free Free Free <space> select source, arrows move, <return> searches, q to quit, ? for help The column labelled "server" names the Internet computer on which the database is located; "source" is a brief description of the contents of the database; and "cost" is the cost to the user. In the upper right hand corner, "sources 24" indicates that this particular WAIS server has access to 24 Internet databases. When this screen first appears, you should see the top line highlighted. The up and down arrow keys on your keyboard allow you to move this highlighted line to different entries. To select an entry, you would use an arrow key to move to a desired source. Move the cursor to the line for the Wall Street Journal, and press the space bar. It will now have an asterisk in front of it meaning it is a source that will be searched. What a Source Looks Like After Having Been Selected ... 11: [ microworld.media.mit] Poetry 12: * [ cmns.think.com] wall-street-journal 13: [ cmns.think.com] world-factbook ... <space> select source, arrows move, <return> searches, q to quit, Free Free Free ? for help Chapter 13: WAIS (Wide Area Information Server): An Interface to Databases NorthWestNet User Services Internet Resource Guide 151 Now we can begin a search. Let's look for entries which contain information about tropical forests. Press the <RETURN> key, the screen will clear, and you will be presented with a keyword prompt. The Keyword Search Window U> KEYWORDS: tropical forest Enter keywords with spaces between them; <return> to search Searching: wall-street-journal WAIS is now establishing an Internet connection to the computer "cmns.think.com", and searching through the database of Wall Street Journal articles for anything containing information relevant to the words "Tropical Forests." In a few seconds, the search is done, and the results are displayed on your screen. The "score" column indicates WAIS's estimate as to how well that article fits your request, with 1000 being considered a "perfect fit." The articles will be listed from most to least relevant. Chapter 13: WAIS (Wide Area Information Server): An Interface to Databases NorthWestNet User Services Internet Resource Guide 152 List of Articles Retrieved by WAIS SWAIS # Search Results Score Source Item Title 01:[1000] (cmns-vax.think) Debate About Tropical Forests Rage 02:[ 887] (cmns-vax.think) The Market -- Conservation's Best 03:[ 838] (cmns-vax.think) FORM + FUNCTION----By John 04:[ 570] (cmns-vax.think) U.S. Forest Service Plans a Cut 05:[ 537] (cmns-vax.think) Business Brief -- Forest Oil Corp. 06:[ 505] (cmns-vax.think) As a Substitute, Somehow the Guy 07:[ 496] (cmns-vax.think) Business Brief -- Manville Corp.: 08:[ 496] (cmns-vax.think) Manville Corp.'s Net Fell in 1s 09:[ 496] (cmns-vax.think) Who's News: Fletcher Challenge 10:[ 488] (cmns-vax.think) Letters to the Editor -- Dolphi 11:[ 488] (cmns-vax.think) It's Rumored They Might Enlist 12:[ 480] (cmns-vax.think) Hershey Foods, Jell-O Are Mixing I 13:[ 480] (cmns-vax.think) Forest Products Makers to Post 14:[ 480] (cmns-vax.think) Letters to the Editor: Owls & O 15:[ 472] (cmns-vax.think) British Columbia Reaches--Compro 16:[ 472] (cmns-vax.think) Georgia-Pacific Earnings Drop 17:[ 464] (cmns-vax.think) Letters to the Editor: Dolphin18:[ 448] (cmns-vax.think) Business Brief -- Georgia-Pacific 19:[ 448] (cmns-vax.think) Potlatch Corp. Debentures SAN <space> selects, arrows move, w for keywords, s for sources, Lines 169 190 118 64 31 60 36 46 31 59 62 107 150 140 41 53 47 25 24 ? for help Just like in the main menu, we select a particular entry by moving the highlighted line to a desired entry, and press the space bar. Selecting an Article 01:*[1000] ( cmns-vax.think) Debate About Tropical Forests Ra 169 Retrieving: Debate About Tropical Forests Rages ...and then the article is displayed on the screen. Chapter 13: WAIS (Wide Area Information Server): An Interface to Databases NorthWestNet User Services Internet Resource Guide 153 0050564WJ 9004060153J WALL STREET JOURNAL (J), NO PAGE CITATION 900406 Copyright (c) 1990 Dow Jones & Company, Inc. FOREST, MONETARY NEWS, FOREIGN EXCHANGE, TRADE (I/MON) ENVIRONMENT (I/ENV) PULP, PAPER, PACKAGING (ALL TYPES) (I/PUL) Debate About Tropical Forests Rages Southeast Asian Officials Assail Conservationists By Raphael Pura Staff Reporter of The Wall Street Journal KUCHING, Malaysia--Mention the fate of Southeast Asia's tropical forests these days and watch official hackles rise. "I'm not an environmental villain," protests Abdul Taib Mahmud, chief minister of Sarawak, a steamy Malaysian state on the north coast of Borneo. He challenges conservationists to fly over his timbercarpeted domain: "You'll be lucky if you see any bald patches anywhere in Sarawak." Like other government leaders across the region, Tan Sri Taib has reason to be defensive. Like it or not, Southeast Asia is being sucked into the center of a global controversy over the world's fast-diminishing tropical forests. International environmental groups assert that unless the region's governments and timber industry mend their ways, their actions will contribute to ecological problems that ultimately will affect the entire Earth. Rapid deforestation of the tropics, environmentalists say, threatens to wipe out species of plant and animal life, contributes to harmful changes in the global climate, and destroys forestdwelling societies. (MORE) Reading an Article You can press any key and see the rest of the article. When we've finished reading the article, the following menu reappears at the bottom of the screen. <space> selects, arrows move, w for keywords, s for sources, ? for help We could continue looking at the other articles in the list from the Wall Street Journal; but to make a point about the power of WAIS, let's broaden the scope of our search. By accessing another database, we can learn more about Borneo, one of the places mentioned in the article. Use the "s" command to go back to the list of databases sources. U> s You will see the list of sources we saw previously. Put the highlighted line on the line referencing the "Wall Street Journal," and press the space bar. This will "unselect" the Wall Street Journal. Now move the highlighted Chapter 13: WAIS (Wide Area Information Server): An Interface to Databases NorthWestNet User Services Internet Resource Guide 154 line to the next line, the "world factbook," which contains summary information on countries and places around the world. 13: * [ cmns.think.com] world-factbook Type "w" to get the keyword search window: U> w U> Keywords: Borneo Enter keywords with spaces between them; <return> to search Searching: world-factbook SWAIS # 01: Search Results Score [1000] Source ( cmns-vax.think) Item Title Appendix E: Cross-Reference L Lines 1072 <space> selects, arrows move, w for keywords, s for sources, ? for help Retrieving: Appendix E: Cross-Reference List of Geographic Names You will now see the World Factbook Cross-Reference List of Geographic Names. Borneo is about four pages down in the list, so we need to scroll through a few pages of geographic names. Chapter 13: WAIS (Wide Area Information Server): An Interface to Databases NorthWestNet User Services Internet Resource Guide 155 0000254CIA The World Factbook 1990 900101 Addendum E: Cross-Reference List of Geographic Names This list indicates where various names including all United States Foreign Service Posts, alternate names, former names, and political or geographical portions of larger entities can be found. WORLD FACTBOOK names are not necessarily approved by the United States Board on Geographic Names (BGN). Alternate names are included in parentheses, additional information is included in brackets. Name Entry in the WORLD FACTBOOK Abidjan (US Embassy) Abu Dhabi (US Embassy) Acapulco (US Consular Agency) Accra (US Embassy) Adana (US Consulate) Addis Ababa (US Embassy) Adelaide (US Consular Agency) Adelie Land (Terre Adelie) Ivory Coast United Arab Emirates Mexico Ghana Turkey Ethiopia Australia Antarctica --More-- (There are several more pages before we get to Borneo.) Bora-Bora Bordeaux (US Consulate General) Borneo Bornholm Bosporus French Polynesia France Brunei; Indonesia; Malaysia Denmark Atlantic Ocean (followed by many more pages of place names According to this list, we can get more information about Borneo by looking at the specific listings for Brunei, Indonesia, and Malaysia. We'll select the file for Brunei to show you what a country listing looks like. As usual, press the w key to get the keyword search screen, and type "Brunei". U> w U> Keywords: Brunei Enter keywords with spaces between them; <return> to search Searching: world-factbook Chapter 13: WAIS (Wide Area Information Server): An Interface to Databases NorthWestNet User Services Internet Resource Guide SWAIS Search Results Item # Score Source Title 01: [1000] ( cmns-vax.think) Country: Brunei--Geography 02: [ 864] ( cmns-vax.think) Country: Malaysia--Geograp 03: [ 822] ( cmns-vax.think) Appendix E: Cross-Reference 04: [ 822] ( cmns-vax.think) THE WORLD FACTBOOK <space> selects, arrows move, w for keywords, s for sources, ? for help 156 Lines 224 295 1072 697 Move the cursor to line #1, press the space bar, and the file for Brunei will be displayed. 0000034CIA The World Factbook 1990 900101 Country: Brunei - Geography Total area: 5,770 km2; land area: 5,270 km2 Comparative area: slightly larger than Delaware Land boundary: 381 km with Malaysia Coastline: 161 km Maritime claims: Exclusive fishing zone: 200 n Territorial sea: 12 nm Disputes: may wish to purchase the Malaysian salient that divides the country Climate: tropical; hot, humid, rainy Terrain: flat coastal plain rises to mountains in east; hilly lowland in west Natural resources: crude oil, natural gas, timber Land use: 1% arable land; 1% permanent crops; 1% meadows and pastures; 79% forest and woodland; 18% other; includes NEGL% irrigated Environment: typhoons, earthquakes, and severe flooding are rare Note: close to vital sea lanes through South China Sea linking Indian and Pacific Oceans; two parts physically separated by Malaysia. - People Population: 372,108 (July 1990), growth rate 7.1% (1990) Birth rate: 23 births/1,000 population (1990) Death rate: 4 deaths/1,000 population (1990) (Followed by much more very detailed information) Chapter 13: WAIS (Wide Area Information Server): An Interface to Databases NorthWestNet User Services Internet Resource Guide 157 FOR MORE INFORMATION ON WAIS The FTP Host at think.com contains much of what you need to know to get started using or installing WAIS. FTP Host: directory: files: think.com wais NCSA-Telnet-MacTCP.sit.hqx UNC WAIStation-0-61.sit.hqx WAIStation-0-62.sit.hqx WAIStation-Canned-Demo.sit WAIStation-README Z3950 etc motif-a1.tar.Z wais-8-b1.tar.Z wais-8-b2.tar.Z wais-8-b3.tar.Z wais-corporate-paper.text wais-overview-docs.sit.hqx wais-project (Telnet for MAC WAIS (directory of WAIS for SUN (Version 0.61 MAC WAIS (Version 0.62 MAC WAIS (MAC WAIS Demo (GET THIS FILE.... (directory of Z39.50 info (private directory (Motif / WAIS code (WAIS for Unix (WAIS for Unix (WAIS for Unix (WAIS document (WAIS docs. for MAC WAIS (private directory Note that all of the program files are archived and compressed. Use binary mode during your FTP transfer, and when you've received them, unarchive and uncompress the files. OS MAC Unix Unarchiving Program BinHex 4.0 or newer tar Uncompressing Program UnStuffIt uncompress Read the passage in Chapter 4 of NUSIRG entitled "The ABCs of Handling Special Files" if you need more information about how to use these programs. KEEPING UP TO DATE WITH WAIS Mailing Lists There are a number of Internet interest groups devoted to discussions about WAIS: [email protected] [email protected] [email protected] moderated mailings every 1 or 2 weeks. major monthly announcement about WAIS unmoderated and active discussion for WAIS users and implementors To subscribe to these groups, send an e-mail message to "[email protected]": Mail: Subject: Message: [email protected] Subscription Request (request a subscription, and provide your name, user-id, and Internet address) Chapter 13: WAIS (Wide Area Information Server): An Interface to Databases NorthWestNet User Services Internet Resource Guide 158 USENET Newsgroups Read this newsgroup through your USENET newsreader software. (For information about USENET, read Chapter 7 of NUSIRG.) By time you read this, there will probably be many more USENET discussion groups which deal WAIS in the "comp" and other major hierarchies. alt.wais if your site doesn't receive this group, send a message to the person responsible for your site's USENET news feed. TECHNICAL CONTACT: Brewster Kahle Thinking Machines Corporation 1010 El Camino Real, Suite 310 Menlo Park, CA 94025 415-329-9300 X228 [email protected] Thinking Machines Corporation 245 First Street Cambridge, MA 02142 617-234-1000 PUBLISHED REFERENCES ABOUT WAIS Printed copies of the following and many other WAIS documents can be obtained by contacting: [email protected] Barbara Lincoln Thinking Machines Corp. 1010 El Camino Real Suite 310 Menlo Park, CA 94025 phone: (415) 329-9300 fax: (415) 329-9329 Markoff, J. 1991. "For the PC User, Vast Libraries." New York Times. July 3. pp.C1. Stanfill, C., and R. Thau, 1991. "A Parallel Indexed Algorithm for Information Retrieval." Proceeding of the 12th International Conference on Research and Development in Information Retrieval SIGIR-89. Stein, R. 1991. "Browsing Through Terabytes." Byte Magazine, May. pp. 157-164. Chapter 13: WAIS (Wide Area Information Server): An Interface to Databases NorthWestNet User Services Internet Resource Guide 159 Chapter 14: Internet Directory Services "In my house there's this light switch that doesn't do anything. Every so often I would flick it on and off just to check. Yesterday, I got a call from a woman in Germany. She said, 'Cut it out.'" Steven Wright OVERVIEW OF USING INTERNET DIRECTORY SERVICES In the previous chapters of NUSIRG, you've learned how to: ❏ Use Internet tools ❏ Get information about information and resources In this chapter you'll learn how to: ❏ Get contact information for people on the Internet ❏ Find e-mail addresses for computers on the Internet With the techniques described in this chapter you will be able to independently find user-ids and addresses appropriate to your particular needs and interests, rather than having to consult already compiled lists of information. Specifically, you will learn how to answer questions like the following: ❏ "What is the user-id and e-mail address for my colleague Jason Jaspers at Oregon State University in Corvallis?" ❏ "How do I find the Internet address of a computer at the University of Montana which has data I need for my economics class project?" or even: ❏ "I think my long lost buddy from high school, Robin Sampson, might have an account on the Internet. How can I find her user-id and e-mail address?" Chapter 14: Internet Directory Services NorthWestNet User Services Internet Resource Guide 160 CURRENT CAPABILITIES OF INTERNET DIRECTORY SERVICES Every day, we can get information about people's and companies' telephone numbers without a second thought. All we have to do is look in a phone book or call directory assistance. Equivalent services are also becoming available for the Internet. Computer scientists are actively working on projects such as Knowbots and X.500 directory services which will be like "white pages" of users and hosts, and "yellow pages" of network services. These services are still under development. Consequently some of them are awkward to use, and contain information for only a tiny fraction of users, hosts, and services on the Internet. But even though present-day Internet information services are very incomplete in their coverage, a small percentage of a huge number can still be a very large number. For example, the "whois" service at nic.ddn.mil probably lists somewhere around 2% of all Internet users and hosts--but this still amounts to over 75,000 users. TECHNICAL AND ETHICAL CHALLENGES TO INTERNET DIRECTORY SERVICES These caveats are not meant to disparage the contributions of the many people working on such projects, but rather to acknowledge the difficulty of the task with which they are wrestling. Many technical, ethical, and economic issues significantly complicate the provision of (or even deciding whether to provide) comprehensive, reliable, and easy to use Internet directory services. In light of all these issues, providing Internet information services is one the great challenges facing computer network technology. ❏ Complexity of Computer Information: E-mail addresses and their user-ids are often considerably more complicated and variable in format than information needed for telephone listings. For example, one person usually has no more than one home address, while it's not unusual for a computer user to have five or six computer accounts. ❏ Volatility of Computer Information: In addition, e-mail addresses or user-ids change much more rapidly than postal addresses or people's names. Your town has probably been in the same state since it was established, the street you live on has probably had the same name for decades, and very few people change their first names. In contrast, the domain name of an Internet computer might change every couple of years, and your user-id(s) can be changed at any time, based on decisions made by you or by systems administrators. ❏ Local Information Services are Still Embryonic: In order for an Internet wide information system to be created, it would be useful (though possibly not necessary) for local site information systems to be developed and perfected. This is not yet the case. Most institutions still do not have a publicly accessible master list of local user-id's and services. ❏ Privacy and Security Issues: Many sites are understandably reluctant to publicize some or all addresses or user-ids because of concerns about unauthorized access to sensitive data or costly computer resources. ❏ Competing Paradigms: Standardized Internet protocols have already been established for transmitting data (TCP/IP) and resolving computer names (DNS). However, there are still a number of competing approaches for providing Internet "white pages" and "yellow pages" services, and, very likely, additional programs will be created in the next few years. On the bright side, however, Chapter 14: Internet Directory Services NorthWestNet User Services Internet Resource Guide 161 programs, such as Knowbots, which are described below, can be used to present a single user interface for querying distinct information databases. FINDING A PERSON ON THE INTERNET (THE EASY WAY) It might seem old-fashioned, but you can find most people after a few well-planned phone calls or letters, at minimal cost in time and money. When you contact them, you can ask them directly for their user-id and e-mail address. Here's a typically vague "person directed" question a typical Internet user might ask which is best approached by "traditional" methods. You: "I had a friend in High School named Robin Sampson. We agreed that no matter what, we would get in touch with each other before 1992. She loved the Pacific coast, so I bet she's somewhere between Baja and Alaska. The last time we talked she was majoring in computer science at Oregon State, so it seems likely she might use the Internet." "I guess I'll try Robin's old phone number in my address book". Tel: "We're sorry, this number has either been disconnected or is no longer in service..." You: Call Alaska directory assistance:"Could I have the number for Robin Sampson or her dad, Henry Sampson?" Tel: "We're sorry, those names aren't listed for Anchorage or anywhere else in Alaska." You: "Hello, is this the Oregon State alumni office? Could I have the current address for Robin Sampson, class of 1985?" Tel: "We're sorry, on her alumna information form, she wrote 'Headed for the great unknown; have fun tracking me down!'" Don't give up yet! You could try contacting some mutual friends or checking with directory assistance in other area codes along the Pacific. But Robin appears to be a member of the rare and elusive few who cannot be so easily found (and having read this far, you appear to be one of those people who thrive on the challenge of pushing existing technology "through the envelope"). FINDING A PERSON ON THE INTERNET WITH DIRECTORY SERVICES If you can't find a person's Internet address by using telephone calls or postal mail, there are a few Internet directory services which you can try. Table 1 gives a brief summary of the features and uses of the most useful Internet directory services. Table 2 summarizes the basic "how to's" of accessing each of these services. The rest of this chapter presents more detailed information and examples on these services, and presents a few sample sessions. Chapter 14: Internet Directory Services NorthWestNet User Services Internet Resource Guide 162 Table 1: Summary of Internet Directory Services Knowbot Information Server (KIS) A white pages "meta-service" which searches for finding user-ids of Internet users listed in many other white pages services, including: finger (@ any Unix host, e.g., [email protected]) [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] X.500 This list includes most of the other services on this page, so KIS is your best candidate for "one stop" name searches. "USENET Address Server" (hereafter referred to as"U-ASK") Searches for user-ids and e-mail addresses of people who have posted messages to USENET discussion groups. This is a very useful service for finding "average" Internet users who have posted to USENET. It's not a fullfeatured directory service, just a list of names and e-mail addresses searched by the Unix grep command (this service actually has no name; "U-ASK" was coined so it could be referred to by a name in this document). DDN Network Information Center WHOIS Service Searches for names, user-ids, computer and postal addresses, telephone numbers and other contact information for 70,000+ registered users, hosts, organizations, gateways, and networks throughout the Internet. Most persons listed are network administrators or technical staff; especially good coverage of MILNET (formerly ARPANET). PSI White Pages Pilot Project Searches for names, user-ids, and e-mail addresses, primarily administrators and staff of participating institutions. This is an exploratory project of the X.500 Directory Service. soc.net-people This is a USENET discussion group which is devoted to helping people find other people. It is accessed by using USENET newsreader and news posting software (for more information about USENET, refer to Chapter 7 of NUSIRG). If you post to this group, you are encouraged to make your "subject" line as concise and informative as possible. For example, an intelligent posting to find our hypothetical friend Robin Sampson might look like this: subject: Western U.S: Robin Sampson I am attempting to locate a friend named Robin Sampson. The last I heard from her was in 1983, when she was studying computer science at Oregon State (followed by other relevant information). Chapter 14: Internet Directory Services NorthWestNet User Services Internet Resource Guide 163 Table 2: Basic Access Information for Internet Directory Services How to Use this Table The syntax examples present the simplest possible kind of search; most of these services have additional options for more sophisticated searches (e.g., restrict the search to users in a particular geographic region, etc.) Service Knowbot Access Info e-mail TELNET "U-ASK" DDN.MIL PSI Addresses and Basic Syntax Examples [email protected] [email protected] nri.reston.va.us 185 (no password) sol.bucknell.edu 185 (no password) (you *must* include 185, the port #) syntax example: online help: query Robin Sampson help or ? e-mail [email protected] syntax example: online help: send usenet-addresses/Sampson no e-mail TELNET [email protected] nic.ddn.mil syntax example: online help: whois Sampson extensive help and tutorials TELNET wp.psi.com (login = fred) or wp2.psi.com (login--fred) syntax example: online help: whois, but please read online help. This is a complex system man fred or manual KNOWBOT INFORMATION SERVER (KIS) Summary Retrieves user-ids, e-mail addresses, postal addresses, telephone numbers, and institutional affiliation for users throughout the Internet. In its current implementation, KIS is set up to search other white pages datasets (thus KIS is referred to as a white pages "meta-service"). The following white pages services are currently accessed by KIS: [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] X.500 finger (@ any Unix host, e.g., [email protected]) Chapter 14: Internet Directory Services NorthWestNet User Services Internet Resource Guide 164 This list includes most of the other services discussed in this chapter, and new services will be added as they become operational, so KIS is your best choice for "single stop" name searches. Access Methods ❏ e-mail: ❏ TELNET: [email protected], or [email protected] nri.reston.va.us 185, or sol.bucknell.edu 185 (no password required) Local Installation KIS can be installed locally and run on computers connected to the Internet using any version of Unix with Berkeley style sockets. KIS currently has translation programs for whois (nic.ddn.mil), profile, mcimail, QUIPU, and finger. Any sites using these services can be added easily to a locally installed KIS. Sample Knowbot Information Server Session (via TELNET) Note that this entire session could have been performed with a single e-mail request as long as each user command was placed on a separate line. User Commands (U>), KIS responses (K>) Explanation U> telnet nri.reston.va.us 185 U> services K> nic K> mcimail K> ripe K> x500 (be sure to set the org) K> [email protected] host U> query Robin Sampson (make TELNET connection) (show directory services available by default at this KIS site) K> Name: K> Organization: K> Address: K> City: K> State: K> Country: K> Zip: K> Phone: K> E-Mail: K> Source: K> Ident: K> Last Updated: (search for Robin Sampson) Robin Sampson Oregon State University Corvallis OR US 97331-3902 503/555-9999 [email protected] [email protected] RSA999 02-Apr-91. K> No matches found for Robin Sampson from [email protected] K> No matches found for Robin Sampson from [email protected] U> service [email protected] (use the finger program at Chapter 14: Internet Directory Services NorthWestNet User Services Internet Resource Guide 165 Robin's computer) U> print (ask for display of current KIS search variables) K> name Robin Sampson K> service [email protected] K> raw = FALSE U > query Robin Sampson (search for Robin again) K> Name: K> E-Mail: K> Source: K> Last Updated: (output from the finger) (daemon at ucs.orst.edu) Robin Sampson [email protected] [email protected] (unknown) U> quit (type "quit" to leave KIS) For More Information About KIS Online Help: help, ?, and help <command> (e.g., help query) Technical Documents: FTP Host: directory: files: Overview Document NNSC Internet Resources Guide, Section 4.5 Discussion Group: [email protected] nri.reston.va.us rdroms KIS.PS KIS.txt (to subscribe, send e-mail to: [email protected]) USENET-ADDRESSES SERVER (U-ASK) Summary Retrieves user-ids and e-mail addresses. This service is based on a simple C program which searches ("greps") through a list of names, user-ids, and e-mail addresses culled from USENET article headers. As of September 1991, it is installed only at pit-manager.mit.edu. The addresses database is updated every month or two. on the up-side: ❏ Searches through this database will often turn up many names not found in the standard white pages services (as in the hypothetical example below). Chapter 14: Internet Directory Services NorthWestNet User Services Internet Resource Guide 166 on the down side (until other sites install such servers...): ❏ Not all USENET groups are received at MIT (e.g., regional groups). ❏ Many USENET articles are posted with limited distribution, and will not be included in the database. Access Method Send an e-mail message to the mailserver using the following syntax: e-mail: subject: message: [email protected] (none needed) send usenet-addresses/name for example: mail mail text: [email protected] send usenet-addresses/Sampson In a few minutes, you should receive a mail file from the mail-server containing all user-ids and e-mail addresses for anyone with the last name of "Sampson" who has posted USENET articles received at MIT: ... [email protected] [email protected] [email protected] ... (Robin Sampson) (Robin Patricia Sampson) (Robin Thomas Sampson) Local Installation If you or your users anticipate needing to access this database frequently, you can FTP the database (currently > 2 megabytes in size) and use locally written search programs to search through it: FTP Host: directory: file: pit-manager.mit.edu pub/usenet-addresses addresses.Z For More Information About U-ASK If you have problems with the present server at MIT, send mail to [email protected]. PSI WHITE PAGES PILOT X.500 PROJECT Summary Retrieves names, user-ids, computer and postal addresses, primarily for administrators and staff of participating institutions. PSI White Pages is a "pilot project" sponsored by the U.S. Defense Advanced Research Projects Agency and the U.S. Air Force. Chapter 14: Internet Directory Services NorthWestNet User Services Internet Resource Guide 167 X.500 is a strongly hierarchical storage system--entries are arranged in trees, with each entry having "parents" and "children." Such a storage and recovery system is very effective for highly structured organizations. Access Methods TELNET: login: wp.psi.com or wp2.psi.com fred (fred means "FRont End to the Directory") Sample X.500 Session (via TELNET) In the following session, commands which you enter are preceded by "U>" or "U>fred>", and responses from the X.500 directory service are preceded by "X>". Please note that this database is frequently updated. Thus, the information you obtain from a search will differ from this example. U> telnet wp.psi.com U> login name is fred U> fred> whois * -org NorthW X> NorthWest Net (1) +1 206-562-3000 X> NorthWest Net X> Suite 202 X> 15400 SE 30th Plc X> Bellevue X> WA X> 98007 X> A regional network supporting educational/commercial research X>Name: NorthWest Net, US (1) X>Modified: Wed Oct 16 13:27:42 1991 X> by: Manager, US (2) X>14 children. X> X> 5. Battelle Pacific Northwest Labs X> 6. Montana State University X> 7. ND-HECN-North Dakota State University X> 8. Oregon Graduate Institute X> 9. Oregon State University X> 10. Portland State University X> 11. University of Alaska X> 12. University of Idaho X> 13. University of Oregon X> 14. University of Washington X> 15. Washington State University X> 16. Western Washington University X> 17. Manager X> 18. Postmaster Chapter 14: Internet Directory Services NorthWestNet User Services Internet Resource Guide 168 You can then query X.500 for more information about any one of the individual sites which it has listed. For More Information About The PSI White Pages Project There is a great deal of documentation about the PSI White Pages Pilot Project specifically, and X.500 and QUIPU generally. Online Help: help, ?, and help <command> (e.g., help query) Introductory Documents: You can send e-mail to [email protected] and to [email protected] report-1.ps report-2.ps report-3.ps "White Pages Pilot Project: Status Report, 12/31/89" "Realizing the White Pages using the OSI Directory Service, 5/2/90" "White Pages Pilot Project: Status Report, 9/10/90" In addition, PSI's proprietary graphical interfaces to the White Pages are available in source form to interested parties by contacting [email protected]. A brochure on the White Pages is available by sending e-mail to: [email protected] The following essay compares the merits of X.500 and Z.39.50: "Towards Networked Information Retrieval," by Wengyik Yeong, PSI Inc. FTP Host: Directory and files: uu.psi.com wp/nir.txt wp/ps/nir.ps (ASCII) (PostScript) Online Discussion Groups of X.500 Related Topics USENET Newsgroups: comp.protocols.iso comp.protocols.iso.dev-environ Mailing Lists: [email protected] [email protected] To subscribe to these mailing lists, send a subscription request to: [email protected] or isode-request @nic.dd.mil Chapter 14: Internet Directory Services NorthWestNet User Services Internet Resource Guide 169 INTERNET DIRECTORY SERVICES: WHERE DO WE GO FROM HERE? The evolution of the Internet, like most other forms of technology, is very responsive to the needs and activities of its users. The demands which you and other Internet users place on the services described in this chapter will be a powerful incentive for the creation of high quality Internet directory services. It has taken years of development to attain the level of quality we expect from traditional information systems such as telephone directory services. Internet directories are not yet as comprehensive, reliable, or easy to use as they could be, but with strong demand from the user community and rapid response from service providers, such systems could be at hand before the end of the decade. Chapter 14: Internet Directory Services NorthWestNet User Services Internet Resource Guide 170 SECTION 5: EXPLORING NEW FRONTIERS Chapter 15 : Using the Global Internet in K-12 Education ..................................................... 171 Introduction ............................................................................................................. 172 Why Use Computer Networks In K-12 Education?................................................... 172 To What Networks Can K-12 Schools Connect? ...................................................... 176 To What Network Should We Connect?................................................................... 181 Are There Sources of Ffunding to Help Defray the Costs? ....................................... 181 Using Global Networks For K-12 Education ............................................................ 182 Table 1: LISTSERV Discussion Groups Relevant to K-12 Educators and Students ................................................................................................................... 191 Table 2: Interest Groups of Potential Value to K-12 Audiences............................... 194 Table 3: Pointers to USENET Groups and Categories of Particular Interest to K-12 Educators ........................................................................................................ 195 Table 4: Electronic Journals Of Possible Value to K-12 Educators.......................... 197 ADDENDUM 1A: Contacts For Regional Internet Service Providers...................... 198 ADDENDUM 1B: Contacts For Commercial Internet Service Providers................. 201 ADDENDUM 2: Statewide Education Networks and Contacts................................ 202 ADDENDUM 3: Cooperative Not-For-Profit Network Providers ............................ 213 K-12 Education Unlike the previous sections of NUSIRG which dealt with general purpose Internet tools and resources, the chapter in this section is directed at special subsets of Internet users: K-12 educators and students. The Internet activities described in this chapter represent rapidly evolving applications of networks for education and research. K-12 educational users are propelling the use of the Internet to new and exciting frontiers. Section 5: Exploring New Frontiers NorthWestNet User Services Internet Resource Guide 171 Chapter 15 : Using the Global Internet in K-12 Education "Do you know what it is to be alive?" "It's when you can do things." "Is a cat alive?" "Yes." "A table?" "No." "Why not?" "It can't move." "Is a bicycle alive?" "Yes." "Why?" It can go." "Is a bicycle alive when it isn't moving?" ""Yes." "Is the moon alive?" "Yes, sometimes it hides behind the mountains." From a conversation between Jean Piaget and a seven year old boy "The Child's Conception of the World" THE PURPOSES AND USES OF THIS DOCUMENT In the past few years, there has been increasing growth in the use of statewide, national and even international networks in K-12 education. This chapter provides an introduction to some of the many Internet resources which are of special interest to K-12 educators, as well as a brief overview of other providers who specialize in K-12 networking. ❏ ❏ ❏ If you don't know anything about such networks, you'll be introduced to some of the exciting educational potentials of computer networks. If your school is contemplating becoming networked, you'll gain a greater understanding of who is providing network services, what they offer, and who to contact for more detailed information. If you're already using computer networks, you'll be directed to a wealth of resources which will allow you to enhance the educational value of networks in your school's curriculum. Much existing network documentation is designed for users at universities and research institutions. The information that a K-12 audience needs is often buried in a tangle of technical references not directly relevant to your purposes. The goal of this report is to focus on network services that are of immediate value to K-12 education. This primer will prove most useful to schools which have or are contemplating gaining access to a global network called "The Internet." Nonetheless, many of the resources and references included will be useful for schools using other wide area networks as well, especially if these networks allow direct or gatewayed communication to the Internet. Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 172 You'll get the most from this primer if you use it as a K-12 specific supplement to the rest of the chapters of the NorthWestNet User Services Internet Resource Guide (NUSIRG). We suggest that you use the body of the NUSIRG to provide information about how to access and to take full advantage of the major classes of Internet resources (i.e., electronic library resources, electronic books, data bases, and remote computing resources). INTRODUCTION Rapid growth is now occurring in computer networks throughout the United States among primary and secondary schools. Many proponents of K-12 education networking have as their goal the connection of a majority of the nation's schools to international computer networks by the end of the decade. The use of computer networks in primary and secondary education is so new that the typical school is faced with a large number of questions before, during, and after linking to a wide area computer network. ❏ ❏ ❏ ❏ Why would our school want to connect to a global computer network? To what networks can K-12 schools connect? ❏ What kinds of educationally relevant services does each network support? ❏ To whom can we turn for user services and technical help? ❏ What kind of hardware and software do we need? To what network should we connect? Are there sources of funding to help defray the costs? And finally, the most important question is: ❏ How can we make the best use of networks to advantage and enhance our educational curriculum? Because K-12 networking in particular began in earnest only a few years ago and because the networking world in general is evolving so rapidly, definitive answers to the preceding the questions simply do not exist. In fact, there may never be definitive answers for many of these questions; and that may be a good thing! Unlike many national, federally sponsored networks which have centralized authority and administration, each K-12 school district serves a distinct and unique constituency. This diversity and plurality will be reflected in the strategies adopted by each K-12 school district, from the technical to the pedagogical. No single solution can be right for everyone. However, sources of information do exist which will help you make informed decisions about how networks can be used to further the educational goals of your school. The rest of this primer will help you to locate and to use the information you need to answer these important questions. WHY USE COMPUTER NETWORKS IN K-12 EDUCATION? Computer networks offer tremendous opportunities for K-12 education. Educational Opportunities For The Students. For decades, visionaries have been talking about how telecommunications could lead to "a world without borders," a kind of "global village" in which it is as easy to communicate with someone on the other side of the world as it is to visit a next-door neighbor. Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 173 Computer networks can help to make the "global village" a reality for you and your students. With a few keystrokes from the classroom computer, your students can: ❏ ❏ ❏ ❏ ❏ engage in global dialogue with students and instructors using electronic mail; practice written foreign language skills with native speakers in online discussion groups; participate in, or even initiate meaningful projects which are based on collaboration and cooperation of thousands of students throughout the world; obtain supplemental instructions from online tutorials or enrollment in distance education courses at American or even foreign institutions; or gain "information literacy," a basic understanding of how to navigate in and take full advantage of the networked world into which they will be graduating. Information and Hardware Resource Sharing When a school is connected to a full-service, worldwide network like the Internet, it immediately gains access to hundreds of millions of dollars of resources for a very small investment in hardware and software. Networks can be "The Great Democratizer" of educational resources. Even the smallest and most isolated rural school can use the same service enjoyed by the largest and best endowed urban universities. Examples of what students from a networked school can do from their desks include, but are by no means limited to: ❏ ❏ ❏ ❏ accessing hundreds of catalogs of the world's best libraries; instantaneously copying educationally rewarding software and documents from file archives such as Bulletin Board Services; exploring and manipulating complex databases of real research data containing information from agricultural markets, global climate simulations, or even space missions to other planets; enrolling in supercomputer training programs which give students access to the world's most powerful computers. In Service Education and Teacher Enrichment The teachers in primary and secondary schools sometimes feel isolated from the peers, professors, and facilities they had learned to depend on throughout their training in colleges and universities. By using computer networks, K-12 educators can: ❏ ❏ ❏ ❏ continue their professional contacts formed during their college or university education can increase the number and diversity of and educational resources they use while teaching, participate in continued education by enrollment in universities and colleges which offer distance education programs via networks; and, of course, utilize all of the resources listed in the two sections above. A Quick Caveat Appropriately deployed and utilized, computers and computer networks can contribute significantly to improvements in America's educational system. With all the ballyhoo surrounding computers in the modern world, it's crucial to remember that although computer networks do have tremendous educational value, taken alone they will not be the panacea for America's educational system. Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 174 The quality of life in our world is more dependent upon the development of day-to-day, interpersonal skills, and on nurturing basic skills such as "reading, writing, and arithmetic". Computers and computer networks are a blessing only insofar as they further this basic learning process. The most important assets of schools are skilled, dedicated teachers, and parents who have a supportive enthusiasm for their children's education. Computers are-and should always be--a tool, a supplement, not a replacement, for the human resources of our schools. Happily, most applications of computer networks in education have taken these considerations into account. In summary, if used intelligently and with a sensitivity to the student or teacher as a person, networks can deliver such educational benefits that every K-12 school should consider joining a computer network. Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 175 A Sampler of Projects in K-12 Networking Here we describe a few of the many current K-12 projects using computer networks. These projects are included to give you an idea of the scope and breadth of network activities available to you and your students. You are likely to find that the people involved in these projects will enthusiastically share their expertise and resources, particularly if you are interested in initiating similar efforts. Disabled Data Link Group and Chatback: DDLG and the Chatback Project for Children currently involves 60 schools supporting the use of networks by disabled students, in an effort to assist those with special needs. Cliff Jones e-mail: 2:245/71 (FidoNet) [email protected] (Internet). EARTH KIDS: A non-profit international kids organization to promote communication about and for hands-on, community based ecological projects around the world. For more information, contact: Marshall Gilmore (503) 363-1896. e-mail: 1:105/606 (FidoNet) [email protected] (Internet); NEWSDAY A multi-curricular project in which students in each participating school produce a local newspaper based on the news dispatches submitted on the NEWSDAY news wire by student correspondents. Students become news gatherers and reporters, editors, layout and graphics artists, and publishers. Participation on a national and international scale leads to understanding of broad issues which transcend local concerns. This project can involve your students in weeks of cross-curricular activity. Al Rogers FrEdMail Foundation PO Box 243, Bonita, CA 91908 (619) 475-4852 e-mail: SDCOE!BONITA!AROGERS (FrEdMail) [email protected] (Internet) Project Zero-G: Students, teachers, and adult experts from outside schools will examine aspects of our everyday life and consider how they would have to be redesigned to function in the zero-gravity environments of orbiting space stations like SkyLab and the Soviet Solyut. This can include the design of everyday objects (silverware, shelves, rooms, buildings), and the design of everyday activities (education, sports, transportation vehicles), including the redesign of social interactions. This project can provide an extended global network experience for students and Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 176 teachers in many curricular areas: science, social studies, writing, problem solving, mathematics, art and design. The final designs will be submitted to NASA as a technical report, and will assist NASA engineers in the design of the new American space station. Jim Levin e-mail: [email protected] (Internet) UIUCED2!JLEVIN (FrEdMail) TO WHAT NETWORKS CAN K-12 SCHOOLS CONNECT? This section tells you to how to get information on the major players in K-12 networking and what they have to offer. Even if your school is already connected to a network, you should read this section to find out if there are additional networking options which can either supplement or replace your current setup. Overview Like universities, K-12 schools have many choices for network connectivity: ❏ Internet networks, like the National Science Foundation (NSF)-sponsored regional networks. The next four network options include some networks which are actually part of the Internet, and others which are not: ❏ ❏ ❏ ❏ Statewide networks Non-profit cooperative networks Commercial networks "Public Data Networks" Each networking option has unique strengths and weaknesses. To help you make an informed decision, this section summarizes what services each of these categories of network providers typically can offer K-12 schools. Contact names, addresses, and phone numbers for many network providers are listed at the end of this report so you can communicate with representatives of those networks in which you are especially interested. Overview of "The Internet" The Internet is a global network of networks. As of September 1991 it connected an estimated 5,000 networks, 350,000 host computers, and 3,500,000 people. These already enormous numbers are continuing to grow exponentially every year. All Internet networks, everywhere in the world, use the same "standards" for communicating, called "The TCP/IP Internet Protocols." All that you need about TCP/IP right now is that it makes an enormous variety of services available to the user, and that you can communicate to every computer on the Internet in the same way, no matter what or where it is. Within the United States, there are a number of regional and national networks which use the Internet standards. Detailed information about Internet networks is provided in Chapter 2 of NUSIRG. Of particular interest to K-12 educators is "The National Science Foundation Network" (NSFNET), a high speed, state-of-the-art network which was created specifically to support the use of computer networks in education and research. Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 177 By time you read this, NSFNET and similar national Internet networks may have been renamed "The National Research and Education Network" (NREN). In November of 1991, President Bush signed the High-Performance Computing Act which authorized the creation of a permanent NREN. The bill allocated $2.9 billion over the next five years to enhance the United States' high-performance computing and communications infrastructure. Please see the section "For More Information" on how to keep abreast of NREN developments and funding opportunities. Regional Internet Networks The national NSFNET itself is a framework, or "backbone" network, currently linking NSF-sponsored regional networks distributed throughout the nation. From these NSFNET backbone sites, each regional network branches off to serve many sites throughout a specific geographic region. Some regional networks service a geographically small but densely computerized portion of a single state (e.g., BARRNet for the San Francisco and Silicon Valley area), while others help bring large, sparsely populated regions together into the network world (e.g., NorthWestNet, which serves the United States from Alaska, south to Oregon, and east to North Dakota). Many K-12 schools are already enjoying the benefits of direct connection to the Internet through regional Internet networks. K-12 Users and The Internet Here is what regional Internet networks have to offer everyone, including K-12 users. Resources And Capabilities: ❏ ❏ ❏ ❏ ❏ ❏ ❏ global electronic mail global discussion groups large archives of free software and documents free "electronic books" subscriptions to "electronic journals" computer "white pages" and "yellow pages" to find people and resources on the Internet ability to login to remote computers to access: ❏ hundreds of electronic library catalogs ❏ a wide variety of databases for teaching and research ❏ supercomputers for high speed calculations, state-of-the-art graphics, and other technology applications high In summary, most kinds of resources that are available on computer networks are available through the Internet. In terms of comprehensive networking capabilities, the Internet has no match. Internet Support and Training ❏ ❏ Almost all regional Internet networks have central Network Operations Centers (NOCs) to handle most of the day-to-day maintenance of the network as a whole. Each NOC site within a regional has staff who are devoted to technical maintenance of local sites. Most regionals have, or are planning, central Network Information Centers (NICs) which provide basic documents and other user services support for network users. A few regionals, like Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 178 NorthWestNet, have a well-established track record in providing annual meetings, training programs, and user guides for member institutions. K-12 Specific Internet Support and Services The Internet offers a rapidly growing variety of resources specifically designed for use in K-12 education including: ❏ ❏ ❏ ❏ databases developed especially for K-12 education (e.g., Spacelink) documentation for K-12 networking summer programs at NSF-sponsored supercomputer sites for students and teachers (e.g., Cornell National Supercomputer Facility, National Center for Supercomputer Applications, National Energy Research Supercomputer Center, and Pittsburgh Supercomputer Center) nationwide Internet directory services specifically for K-12 educators should be available by early 1992 through Michigan's Merit network For More Information: Addendum 1A lists the names and contact information for the NSF-sponsored regional Internet networks. State Networks Another promising source of network connectivity for K-12 schools are statewide networks. A survey of statewide networks released in April, 1991, reported that most all of the 50 states either had established, or were about to initiate, state networks which would include K-12 connectivity as a central goal (Kurshan, 1991). Resources and Abilities: Every state network is different. The technical sophistication of statewide networks varies tremendously, between and within states; in some states, connections from K-12 schools are made through dial-up modems, while other states use more modern technologies such as high speed (T1) backbones, fiber optics, point-to-point microwave, and satellite links. Some statewide networks feature direct K-12 Internet access. Most statewide networks offer electronic mail; though in some cases, this is still restricted to administrative purposes. Other general network services offered by some, but not all statewide networks include: ❏ ❏ ❏ ❏ ❏ online dictionaries and encyclopedias discussion groups library catalogs bulletin board services for announcements and software access to the Internet and Internet services K-12 Specific Support and Services From Statewide Networks Since many state networks have been (or are being) developed at least in part, to support K-12 education, some offer services of special interest to K-12 students and educators. ❏ distance education programs through universities and colleges Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide ❏ ❏ ❏ ❏ ❏ ❏ 179 professional employment referral services network distribution instructional video services systems to teach educators how to use networks educational databases online "test-banks" a number of state networks are working on "menu driven" Internet access utilities to make the Internet easier for K-12 use (e.g.,California, Texas, Florida, and Virginia) If you are in a position to make or influence decisions about the design and implementation of your state network, you can get a wealth of useful information by comparing notes with peers working with other state networks. Comprehensive overviews of state networks can be found in McAnge et al. (1990), and Kurshan (1990b, 1991) For your convenience, addendum 2 lists the names and contacts for all statewide networks discussed in Kurshan's 1991 report. Not-For-Profit Cooperative Networks There are many national and even international not-for-profit, cooperative computer networks which are particularly appropriate for K-12 educational networking. Many not-for-profit cooperative networks offer a low cost and effective basic network option for K-12 schools. These networks are particularly valuable for K-12 sites which cannot, or choose not to, connect directly to the Internet, or whose state networks are still embryonic. But even schools which currently employ other network options can gain a great deal by using these services. An especially promising and widespread non-profit network for K-12 education is K12Net, which is an offshoot of a more general purpose network called FidoNet. A brief description of FidoNet and K12Net will give you an idea of how some of these networks work, and a general idea of the kinds of services typically offered by non-profit networks generally. FidoNet FidoNet is an international network with 10,000 electronic "Bulletin Board Systems" (BBS's) in more than 50 countries. It is a "grassroots," decentralized, non-profit network operated entirely through volunteer effort. A BBS can be run with minimal hardware and software requirements. All you need is a telephone, a modem, a personal computer, a hard-disk, and free FidoNet software. A good file backup system is of course a wise investment as well. K12Net K12Net is a spin-off of FidoNet designed specifically for K-12 students and teachers. The goal of K12Net is to create a demand for networking services within the K-12 education community by making it as easy as possible for K-12 schools to start networking. If you have access to a telephone, a modem, and a computer, you can dial up a FidoNet or K12Net BBS, and start exploring the world of K-12 networking immediately. K12Net is an accessible, hands-on network-based technology simple enough for students to learn and even operate. K12Net offers the following services: ❏ ❏ global electronic mail, which can be sent to and received from the Internet K-12 oriented discussion groups Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide ❏ 180 an extraordinarily rich archive of K-12 oriented educational software (currently for MS-DOS computers only), documents, and other information available at 19 major K12Net BBSs. With 10,000 FidoNet sites around the world, chances are good that K12Net can be reached from your school by either free or low cost phone calls. Contact information for a number of the more widespread, K-12 oriented cooperative networks is given in addendum 3, including information for the main regional K12Net system operators, and the phone numbers for calls to their modem-accessible BBS's. National Public Telecommuncations Network The National Public Telecomputing Network (NPTN) is a not-for-profit organization dedicated to establishing and developing free, computerized information and communication services for the general public. NPTN has just been started. As of September, 1991 there were four sites in the Midwest, but by time you read this guide, NPTN may be an international network services provider. Current services are based on Bulletin Board Services which provide a variety of information of interest to the general public. Contact information on NPTN is given in addendum 3. Commercial Networks There are many commercial networks, some of which have targeted their services very specifically at the K-12 market. Most all commercial networks offer: ❏ ❏ electronic mail conferencing systems Commercial networks often provide many other services of interest to K-12 educators such as online encyclopedias. Some commercial networks use Internet protocols, and thus allow full access to the Internet services described earlier. See Kurshan (1990a) and Quarterman (1990) for overviews and contact information for commercial network providers generally. Addendum 1B gives contact information for several commercial Internet network providers. Public Data Networks "Public data networks" tend to be relatively specialized databases which are often accessed by modem calls. McAnge et al. (1990) and Quarterman (1990) provide an introduction to a variety of such services. TO WHAT NETWORK SHOULD WE CONNECT? As the previous discussion demonstrates, K-12 schools can obtain network connectivity from a wide variety of providers. How does one choose which network service is best? If your school hasn't yet been connected to an external network, you might think that the most basic network services, such as electronic mail, would be adequate. But judging from the experience of universities and research Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 181 institutions, it is likely that once you've made a connection to a global network, the use of computer networks by students and teachers at your school will grow rapidly. If you want to be ready for this growth, you should choose a service which offers flexibility for accommodating this growth. If at all possible, you should you choose a service which allows you full access to the Internet. Here are some of the many considerations which have to be taken into account to determine what option is best for your purposes. ❏ ❏ ❏ ❏ ❏ ❏ How much computer experience do your teachers and students already have? What sort of computer equipment does you school already have? What are the costs of obtaining the hardware required for connectivity and the commercial provider's annual fees? Do you need full service connectivity immediately, or would access to electronic mail and conferencing be sufficient to get your staff and students comfortable with networking? Are there any legislative restrictions which make certain options difficult? How well will a particular option scale as more demands are placed on it by newly enthusiastic students and teachers? ARE THERE SOURCES OF FFUNDING TO HELP DEFRAY THE COSTS? Full or partial funding for K-12 networking, ranging from the construction of statewide networks as a whole to the purchase of equipment for individual K-12 schools has come from a wide variety of sources. ❏ ❏ ❏ ❏ ❏ ❏ ❏ state departments of education, energy, or science federal agencies (DOE, NSF, and USDE in particular) private and public universities national and regional telecommunications companies (GTE, SNET, USWest) computer companies (Apple, IBM) contributions from various foundations and individuals K-12 school and school district budgets Financial support for K-12 networking should be justifiable to any of the sources to which you normally turn for any other educational project funding. A new and particularly notable source of funding specifically directed at K-12 networking is The Annenberg Foundation / Corporation for Public Broadcasting project. Under this project up to $5 million per year will be provided for educational applications of telecommunications for a period of 12 years. As of September 1991, there were plans to begin accepting grant proposals for K-12 networking starting in late 1991. For more information, contact: Michael Strait, Ph.D. Project Officer for Research and Evaluation Corporation for Public Broadcasting 901 E. Street NW Washington DC 20004-2006 tel: (202) 879-9646 e-mail: [email protected] Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 182 USING GLOBAL NETWORKS FOR K-12 EDUCATION This section of the document will give brief, K-12 oriented overviews of each of the major kinds of applications you'll encounter when using computer networks. Because the Internet provides the greatest variety of resources (and because it would not be possible to explain the use of these resources on every kind of computer network in this brief document), all examples provided here use the Internet. Nonetheless, the general principles which are illustrated here should be useful even if you are not yet using the Internet. Most of the entries in this section have the following structure: a. A quick description of the resource. b. A real, K-12 oriented example of an Internet application. c. pointers to K-12 specific information about using the resource on the Internet. Certain services which require actual connection to computers (like electronic library catalogs) can only be done through the Internet or very occasionally by using a modem for dial-in access. Much more comprehensive treatment of each of these resources can be found in the resource specific chapters of the NorthWestNet Users Service Internet Resource Guide. Electronic Mail (or E-mail) What is Electronic Mail? Electronic mail (usually referred to as "e-mail") is the most basic service offered by computer networks. E-mail is very similar to regular postal mail, except that it is sent electronically through a computer network and it arrives much faster. With e-mail, you can send messages to anyone on a network, just like you can send a letter to anyone who has a postal address. The most exciting uses of e-mail in K-12 education are for communication and collaboration between and among students and teachers at distant schools. A Specific K-12 Application of Electronic Mail on the Internet E-mail can be used to send messages to computers on the network which will automatically send back information that you have requested. Such computers are called "mail servers." For example, you can send mail to a computer service run by the Oregon Extension Service called "Almanac." This resource contains a wide variety of educationally valuable materials such as "electronic books," and an enormous amount of information from the Department of Agriculture. You can have this information sent to you simply by sending an e-mail message request. In this example, we'll send a message to Almanac, requesting a copy of the Declaration of Independence. Step 1. Start your mail program. Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 183 Step 2. Address a message to the following Internet user-id and address. Note: If you are not on an Internet computer, you will probably have to add additional information. Ask your colleagues if they know how to send mail to the Internet from your site) [email protected] Step 3. You don't have to include anything in the subject line. Step 4. In your mail editor, type the following message: send guten dec-of-ind where "guten" is short for "Project Gutenberg," a non-profit organization dedicated to creating free electronic versions of the world's great literature, and "dec-of-ind" is the file name for the Declaration of Independence. Step 5. Send the mail message. Step 6. In a short while, you should receive e-mail from Almanac. If you did everything right, it will be a copy of the Declaration of Independence! If you made a mistake, the e-mail message from Almanac will give you a hint about what you did wrong and directions for how to send a correct request. If you want more information about Almanac, you can send an e-mail message to Almanac containing one of the following messages: send guide send topic catalog (to get a copy of the Almanac Guide) (to get a copy of Almanac's holdings) Other Applications of Electronic Mail E-mail is also used for accessing many of the network services described in the following sections of this document, such as subscribing to electronic journals or participating in online discussion groups. Online Library Catalogs What Are Online Library Catalogs? Online library catalogs (more precisely known as "Online Public Access Catalogs", or "OPACs" for short) are electronic versions of library card catalogs. OPACs have been installed at hundreds of the world's libraries and are generally free of charge for anyone with an Internet connection. An Example K-12 Specific OPAC Application As an example of the potential of the Internet to provide "real-time" access to remote knowledge bases and informational resources, allow me to relate this personal episode. I was trying to compose text containing a K-12 specific OPAC application when I realized that I was just about to run through a good example while writing this chapter. I am word processing this document on a Macintosh SE at my home in Seattle. I need to find references on the subject "distance education" for the bibliography, but it's 2 am, and all of the libraries in Seattle are closed. But because I have an Internet connection through the University of Washington, I can connect to any one of 200 OPACs in the United States and do a literature search from my home. Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 184 I've just entered the following command on my computer telnet pac.carl.org and in a few seconds I'm connected to the Colorado Association of Research Libraries (CARL) in Boulder, Colorado, about 1,000 miles away from my house. Because I'm doing this through the Internet, I'm not being charged a penny for the connection, nor was I charged for the connection I made to a database in England an hour ago. The cost of these connection services are defrayed in part by the National Science Foundation and in part by the dues and service fees paid by the members and partners of NorthWestNet. CARL asks me what kind of terminal I'm using. To be certain that all of the NUSIRG examples work with the simplest equipment, I'm purposely using a basic terminal emulation program. I select HARDCOPY, which is the appropriate choice for "dumb" terminals without any fancy features. An easy to use menu has appeared on my screen, and I've selected the library catalog option. CARL offers many other interesting databases, but I don't have time to get distracted. The names of 21 libraries in the state of Colorado appear on my screen, and I select the State Department of Education Catalog. Now I'm given a number of options for the kind of search I want to do. I type "w" for "word", and then I type "Distance Education." In two seconds, CARL tells me that it has found 16 books with the words "Distance Education." As it turns out, the very first reference in the list is one that someone in an online discussion group had asked about earlier in the day. The person wasn't sure of the title, so I'm going to send them an e-mail message giving them the full reference. OPACS of Special Interest to K-12 Education Every OPAC has something to offer K-12 education. Most of the best OPACs are only accessible through Internet connection, although a few statewide networks have started providing OPAC services via modem connections. A more complete discussion of OPACs is provided in Chapter 12 of NUSIRG. File Archives There are thousands of computers in the world which contain "file archives" from which files can be copied to your computer for your own use. K12Net Libraries Very useful file archives for K-12 education are maintained in the "K12Net Libraries" throughout the world. These K12Net libraries contain thousands of files on a wide variety of subjects including: ❏ ❏ ❏ educational software course outlines and other material for curricular development documents relating to education generally, including distance education and government publications Document files can be used on most any kind of personal computer. Most of the software currently held in the K12Net Library is for MS DOS based machines, but there are plans to start adding materials for other PC's such as the Macintosh, Apple II's, and Amigas. Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 185 To access the K12Net library, all you need is a phone, a modem, and a personal computer with simple telecommuncations software. To locate the K12Net Library nearest you, get in touch with one of the K12Net contacts listed in addendum 3. Interactive Bulletin Board Services (BBSs) Bulletin Board Services are computers which contain information, training, and files which you can copy for your own use. K12Net / FidoNet All of the K12Net and Fidonet nodes are BBSs. To find the site nearest you, contact one of the main K12Net sites listed in addendum 3. National Public Telecommuncations Network BBSs There are currently four NPTN sites which are accessible by modem calls or with the Internet TELNET protocol. Cleveland Free-Net modem: telnet: Cleveland, Ohio (216) 368-3888 freenet-in-a.cwru.edu freenet-in-b.cwru.edu freenet-in-c.cwru.edu Youngstown Free-Net modem: Youngstown, Ohio (216) 742-3072 telnet: yfn.ysu.edu TriState Online modem: telnet: Cincinnati, Ohio (513) 579-1990 tso.uc.edu Heartland Free-Net modem: telnet: Peoria, Illinois (309) 674-1100 heartland.bradley.edu NPTN plans to establish additional sites in the following communities: Buffalo; Chicago; Denver; Lorain County, OH, Los Angeles; Minneapolis/St.Paul; Portland, OR; Philadelphia; Summit, NJ; Washington, D.C.; Helsinki, Finland; Singapore; and Wellington, New Zealand. Online Discussion Groups Online discussion groups allow you to communicate with people throughout the world who share a specific interest. By having distinct names and limited scopes, discussion groups enable highly focused, topic-specific discourses. So even though the worldwide networks are huge and used by people with many diverse interests, discussion groups make the network world a more homey place. Once you find groups which suit your needs, you can read material "posted" by other people, you can comment on other people's postings, or you can contribute new messages to the group. Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 186 There are many different discussion group services. These differ in how they work and in how they are named. For details on how to use two widely used discussion group services, USENET and LISTSERV, consult Chapters 7 and 8 of NUSIRG. K-12 Specific Discussion Groups Because each discussion group service features a huge number of topic specific groups, it is sometime hard for new users to know which groups are most likely to be useful. For example, the BITNET LISTSERV service offers nearly 3,000 groups! To help get you started, Tables 1, 2 and 3 give a sampling of LISTSERV discussion groups, Internet interest groups, and USENET newsgroups which are most likely to interest K-12 educators. K-12 specific discussion groups are a great place to keep in touch with what other K-12 educators are doing with computer networks. Many of these groups are often used like curriculum development meetings in a world-wide school. Use Tables 1, 2, and 3 as K-12 specific resources when you follow the detailed instructions on how to use discussion group services in the earlier chapters of NUSIRG. Electronic Journals Electronic Journals are like regular magazines. They feature submitted articles which are reviewed, edited, and placed in an organized format within a computer file. The big differences are that the journals are sent to your computer and that you don't have to pay personally for your subscription. Although the number of electronic journals is currently small, it has been predicted that their number and their impact will expand greatly in the next few years. An Example of How to Subscribe to an Electronic Journal To subscribe to an electronic journal, you send an e-mail message to an Internet address. In some cases, the userid you are sending mail to is that of a real person, in which case you can write a regular English language letter requesting a subscription. In other cases, you will be sending a message to a computer program which will read your message and will expect the message to be of a very specific format. For example, to subscribe to the "Distance Education Online Symposium" (which often features articles relevant to applications of networks to K-12 education), you would send an e-mail message as follows: mail: listserv%[email protected] subject: (none needed) SUB DEOS your-full-name In less than a day, you should receive a message saying that you have been subscribed to this electronic journal with information on how to obtain back issues by e-mail. Once you have been subscribed, you will receive a copy of the journal once every month. Electronic Journals of Special Interest to K-12 Education Table 4 lists a number of electronic journals which are of potential interest to K-12 educators. Please refer to Chapter 9 of NUSIRG for more information about Electronic Journals. Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 187 Online Databases There are several Internet accessible online databases which are of particular interest to K-12 educators. To use these databases, you need to know how to use TELNET, which is explained in Chapter 5 of NUSIRG. A large catalog of many other online databases is provided in Chapter 12 of NUSIRG. PENpages: Contains online articles and brochures on agriculture, careers, health, consumer issues, and weather; from The Pennsylvania State University. vt100 terminal emulation recommended. Access: telnet: psupen.psu.edu User-name: PNOTPA e-mail: [email protected] Art Hussey, Assistant Director Computer Services Office of Administrative Services The Pennsylvania State University 405 Agricultural Administration Building University Park, PA 16802 (814) 863-3449 SPACELINK: A very easy to use database and interactive system containing information about NASA and NASA activities. Includes a large number of possible curricular activities for elementary and secondary science classes. A tremendously valuable resource for elementary and secondary science teachers. Access: telnet: username: password: 128.158.13.250 newuser newuser Supercomputer Training Opportunities for K-12 Students and Teachers Several of the NSF sponsored supercomputer sites have established programs for K-12 students. ❏ ❏ ❏ Cornell National Supercomputer Facility (607) 255-8686 National Center for Supercomputer Applications (217) 244-1100 National Energy Research Supercomputer Center (415) 422-1544 K-12 Network Etiquette Just as we unconsciously internalize standards of etiquette in our everyday behavior, there are many issues of network etiquette which may not be apparent to new users of network services, especially among K-12 students. As Jack Crawford, one of the main forces behind "K12 Net," recently wrote, "the ability to keep our echoes Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 188 animated, well behaved, and oriented toward K-12 curriculum increasingly depends upon the zealousness, energy and skill of moderators." Before starting a K-12 networking project with students, it would be wise to read some of the literature on "network etiquette." Quarterman (1989 and 1990) provides a particularly good overview of the issues involved in polite and ethical use of computer networks. Passages in Chapter 3 of NUSIRG, and references in that chapter also deal with some of the etiquette issues involved in electronic mail communications specifically. "Distance Education" Programs For K-12 Educators There are numerous opportunities for K-12 educators and even students to enroll in courses at other institutions around the world. Such "Distance Education" programs are the electronic equivalent of "correspondence schools," but with a major difference. "They often allow real time, interactive contact with instructors and other students via computer networks with electronic mail or even two-way video. Moore and Thomson (1990), Moore et al. (1990) discuss distance education generally. Information on specific statewide programs for K-12 educators can be found in Kurshan (1990b). Very up-to-date information can be obtained by subscribing to one of several LISTSERV discussion groups or electronic journals included in Tables 1 and 4. For More Information On K-12 Networking The best information on K-12 networking can be obtained by diving headlong into the active and exciting discussions taking place on computer networks throughout the world. Several of these discussion groups have been described in this chapter. Subscribe to some of the K12Net, USENET, and LISTSERV groups, and you will be able to keep posted on collaborative projects of many sorts which will be best suited to your particular educational curriculum. Admittedly, this strategy presents a bit of a "bootstrapping" problem for those of you who do not yet have network access, so here's a list of printed references, journals, and professional societies which are of special interest to K12 educators. Books and Articles Beals, D.E. 1991. "Computer mediated communication among beginning teachers." T.H.E. Journal, 18(9), 7477. Carlitz, Robert D. 1991. "Common Knowledge: Networks for Kindergarten Through College." Educom Review 26(2):25-28. Clement, John. 1990. "Networking for K-12 education: bringing everyone together." Available from Educom. Kurshan, Barbara. 1990a. Home Market for Educational OnLine Services: Growth of Market and Strategies for Expansion (available from the author; see contact information at end of addendum 2). Kurshan, Barbara. 1990b. "Statewide Telecommunications Networks: An Overview of the Current State and the Growth Potential." (available from the author; see contact information at end of addendum 2). Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 189 Kurshan, Barbara. 1991. "Statewide Education Networks Survey Results." (available from the author; see contact information at end of addendum 2). Moore, M.G., Thompson, M.M. 1990. "The effects of distance learning: a summary of literature." Pennsylvania State University. Moore, M.G., Cookson,P. J. Donaldson, and Quigley, B.A. 1990. Contemporary issues in American distance education, Pergamon Press, New York. Phillips, G.M., Santoro, G.M., & Kuehn, S.A. 1988. "The use of computer--mediated communication in training students in group problem-solving and decision-making techniques." American Journal of Distance Education, 2(1): 38-51. Quarterman, J. S. 1989. "Etiquette and Ethics," ConneXions--The Interoperability Report 3(4):12-16. Quarterman, J. S. 1990. "The Matrix: Computer Networks and Conferencing Systems Worldwide." Digital Press, Bedford, MA. Roberts, N., Blakeslee, G., Brown, M., and Lenk, C. 1990 . "Integrating Telecommunications into Education." Englewood Cliffs, NJ: Prentice- Hall. "Rural America at the Crossroads: "Networking for the Future." U.S. Congress Office of Technology Assessment."April 1991. (S/N 052 003 0122806; available in government document repositories, or through your legislator. "Linking for Learning: "Computer-and-Communications Network Support for Nationwide Innovation in Education." June 1991. The National Science Foundation's Directorate for Education and Human Resources. Printed Journals The following printed journals are particularly informative for K-12 educators using computer networks: American Journal of Distance Education Classroom Computer Learning Computing Teacher Educational Technology EDUCOM Review Electronic Learning Journal of Computers in Mathematics and Science Teaching Learning Tomorrow Research and Education Networking T.H.E.Journal University Computing Times Periodic Conferences CAUSE Consortium for School Networking EDUCOM International Conferences on Technology and Education International Council for Distance Education Conferences International Symposia on Telecommunications and Education Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 190 NorthWestNet SHARE USENIX Organization EDUCOM 1112 16th Street, NW Suite 600 Washington, DC 20036 phone: (202) 872-4200. Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 191 TABLE 1: LISTSERV DISCUSSION GROUPS RELEVANT TO K-12 EDUCATORS AND STUDENTS For more information on using LISTSERV, please refer to Chapter 8 of NUSIRG. NOTE: The BITNET addresses listed below need to be modified and expanded to be used on other networks. For example here's how you would address a message to KIDCAFE from the Internet: kidcafe%[email protected] The underlined portion could be added to any of the names below. Notice also that there is a "%" between kidcafe and ndsuvm1, instead of an "@" sign. For more information on why this modification of BITNET addresses is necessary and how it works, refer to passages in Chapter 3 of NUSIRG which deal with electronic mail gateways. List Name BITNET address General Topic Area, and Brief Description of List Student Oriented Lists KIDCAFE KIDS-ACT SCOUTS-L SEAC-L SGANET @ @ @ @ @ NDSUVM1 NDSUVM1 NDSUVM1 UNCVX1 VTVM1 KIDCAFE Youth dialog KIDS-ACT What can I do now? Youth groups including Boy and Girl Scouts, etc. Student environmental activism Student government global mail network Education Oriented Lists EDNET6-L KIDPLAN KIDS-92 K12STCTE RESPONSE VT-HSNET @ @ @ @ @ @ IUBV1 NDSUVM1 NDSUVM1 BITNIC NDSUVM1 VTVM1 K-12 Network Management Plan KIDPLAN KIDS-92 Planning KIDS-92 Project List K-12 Steering Committee Response to KIDS-92 VT K-12 School Network Hobbies and Recreation CHESS-L DJ-L GAMES-L SCUBA-L SHOGI-L @ @ @ @ @ GREARN NDSUVM1 BROWNV1 GUV1 TECHNION Chess discussion and organization of tournaments Campus radio DJ's technical discussion Computer games of any sort All aspects of scuba diving Strategic board game, Shogi Subject-Specific Lists Relevant to K12 Education BIOSPH-L CHEMED-L CW-L DISARM-L FILM-L @ @ @ @ @ UBV1 UWF TTUVM1 ALBNYVM1 VMTECMEX Anything relevant to planetary ecology Chemistry education Computers and writing Discussion of global disarmament Film; art, entertainment, techniques equipment Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide HISTORY INTERCUL LITERA-L LITERARY LLTI MARINE-L MCLR MULTI-L MUSIC-ED NATIVE-L PEACE PHYSHARE RURALDEV SAIS-L SCIMATHL SCREEN-L SHAKSPER SPORTPSY TECHED-L TESL-L URBAN-L @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ UBV1 RPIECS TECMTYV1 UCF1V1 DARTCMS1 UOGUELPH MSU BARILV1 UMINN1 TAMVM1 INDYCMS PSUV1 KSUV1 UNBVM1 PSUV1 UA1V1 UTORONTO TEMPLEV1 PSUV1 CUNYV1 TREARN 192 (Peered) History discussion list Study of intercultural communication Literature in English & Spanish Discussions about literature Language learning and technology international Marine studies / shipboard education Midwest consortium for Latino research Language and education in multilingual settings Music education Issues pertaining to aboriginal people Peace studies Sharing resources for high school physics Community and rural economic development Science awareness and promotion Science, math and engineering education Discussion of TV from a pedagogical perspective International electronic Shakespeare conference Exercise and sports psychology Employment, training and literacy issues Teaching English as a second language Urban planning information exchange Special Education / Talented and Gifted Education BEHAVIOR BLIND-L COMMDIS DEAF-L EDINFO-L L-HCAP SPCEDS-L TAG-L @ @ @ @ @ @ @ @ ASUACAD UAFSYSB RPIECS SIUCVMB IUBV1 NDSUVM1 UBV1 NDSUVM1 Behavioral and emotional disorders in children Computer use by and for the blind Speech disorders Deaf list Educational information Technology for handicapped, funding info, etc. SUNY/Buffalo special education (students) Talented and gifted education Teacher Oriented Lists BIOPI-L TEACHEFT @ KSUV1 @ WCU Secondary biology teacher enhancement Teaching effectiveness Educational Uses of Computers and Networks CNEDUC-L CNIDIR-L CONFER-L COSNDISC DEOS-L DEOSNEWS DISTED EDTECH EDUTEL ETDIR-L MEDIA-L PACS-L @ @ @ @ @ @ @ @ @ @ @ @ TAMVM1 UNMV1 NCSUV1 BITNIC PSUV1 PSUV1 UWAV1 OHSTVMA RPIECS UBV1 BINGVMB UHUPVM1 Computer networking and education, esp. K-12 Coalition for Networked Information Academic interactive conferencing Consortium for School Networking The Distance Education Online Symposium The Distance Education Online Symposium Journal of Distance Ed. and Communication Educational technology Education and information technologies Educational technology research & development Educational communications for media services Public-access computer systems forum Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide SCIT-L @ QUCDN 193 Studies in communication and info. technology Software for Education ACSOFT-L PCSERV-L @ WUVMD @ RPIECS Academic software development Public domain software servers Hardware and Operating System Oriented Lists APPLE2-L COCO COMMODOR I-AMIGA I-IBMPC IBMPC-L INFO-APP INFO-MAC INFO-PC MAC-L MACMAIL MACNET-L MACPROG MACSYSTM NEXT-L PC-EVAL PC-L PCSUPT-L PCTECH-L PROG-A16 SHOPTALK SOFTREVU SYS7-L WIN3-L WORD-MAC WORD-PC @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ BROWNV1 PUCC UBV1 UTORONTO UIUCVMD UGA NDSUVM1 UIUCVMD IRLEARN YALEV1 UTORONTO YALEV1 WUVMD DARTCMS1 BROWNV1 IRLEARN UFRJ YALEV1 TREARN UOGUELPH MCGILL1 BROWNV1 UAFSYSB UICV1 HVRFORD HVRFORD Apple II List Tandy color computer List Commodore computers discussion (Peered) Info-Amiga List IBM PC discussions (Peered) INFO-IBMPC Digest Apple II series user's mailing list (Peered) INFO-MAC Digest Distribution of Info-IBMPC Macintosh news and information MAC Mail Macintosh networking issues Macintosh programming Advice about Macintosh operating system (Peered) NeXT computer list Personal Computer evaluation (Peered) Forum IBM PC Discussion for MS-DOS PC technical support staff MS-DOS compatibles support group INFO-ATARI16 Programs Micro Computer Users Forum Small computing systems software review Macintosh System 7.0 Microsoft Windows and related issues Microsoft Word for the Macintosh Microsoft Word for DOS and Windows Networking Hardware and Software 3-COM-L I-KERMIT PCIP PROCOM-L TCP-IP-L @ @ @ @ @ NUSV1 CUVMA IRLEARN ATSUVAX1 UIUCVMD 3-Com users interest group (Peered) INFO-KERMIT Digest TCP/IP protocol implementations for PC Users of Procomm terminal emulators TCP-IP discussion from SRI-NIC Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 194 TABLE 2: INTEREST GROUPS OF POTENTIAL VALUE TO K-12 AUDIENCES To subscribe to one of these groups, send an e-mail message to a special subscription user-id, which is made by adding "-request" to the discussion group's user-id. For example, to subscribe to: [email protected] send e-mail to [email protected] in the body of your message, indicate that you would like to be subscribed to the group. A wide variety of many other online databases is provided in Chapter 12 of NUSIRG. Subscription List Name and Address Specific Subjects Covered K-12 Networking Generally [email protected] [email protected] Global network for kids and teachers Applications of artificial intelligence to education Technical Issues [email protected] [email protected] [email protected] 8 and 16 bit CP/M operating system modem discussion Discussion on TCP/IP for PCs Hobby or Recreation Oriented [email protected] [email protected] [email protected] [email protected] stagecraft%[email protected] [email protected] Bicycle sports and use Small ensemble brass musicians Collection and trading of sports cards/memorabilia Horse enthusiasts Theatre sets, lighting, etc. Whitewater kayaking, rafting Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 195 TABLE 3: POINTERS TO USENET GROUPS AND CATEGORIES OF PARTICULAR INTEREST TO K-12 EDUCATORS There are thousands of USENET newsgroups. First time users of USENET often become overwhelmed by the diversity and are unable to find what groups are appropriate to their interests. To help you get started, this list provides a small sampler of a few specific groups and of the hierarchy that might be of particular interest to K-12 educators. Once you've become comfortable with newsreader software and the structure of USENET, there's a huge variety of newsgroups to explore and read. For information on how to actually use USENET, refer to Chapter 7 of NUSIRG. Note that the first section ("K12 Lists Distributed From K12Net to USENET") are all accessible directly by accessing K12Net BBS's. K-12 Lists Distributed From K12Net to USENET k12.chat.elementary k12.chat.junior k12.chat.senior k12.chat.teacher k12.ed.art k12.ed.business k12.ed.comp.literacy k12.ed.health-pe k12.ed.life-skills k12.ed.math k12.ed.music k12.ed.science k12.ed.soc-studies k12.ed.special k12.ed.tag k12.ed.tech k12.lang.art k12.lang.deutsch-eng k12.lang.esp-eng k12.lang.francais k12.lang.russian Informal discussion, elementary students, K-5. Informal discussion, students in grades 6-8. Informal discussion, high school students. Informal discussion, K-12 teachers. Art curriculum in K-12 education. Business education curriculum in grades K-12. Teaching computer literacy in grades K-12. Health and Physical Education in grades K-12. Home Economics & Career education, grades K-12. Mathematics curriculum in K-12 education. Music and Performing Arts curriculum in K-12. Science curriculum in K-12 education. Social Studies and History curriculum in K-12. Education for students w/ handicaps or special needs. Education for Talented And Gifted students. Industrial Arts, vocational education, K-12. Language Arts curriculum in K-12 education. Bilingual German/English with native speakers. Bilingual Spanish/English with native speakers. Bilingual French/English with native speakers. Bilingual Russian/English with native speakers. A Sampling of Other USENET Newsgroups of Potential Interest to K-12 bionet.general comp.dcom.modems misc.consumers misc.consumers.house misc.education misc.kids misc.rural misc.writing news.announce.newusers news.answers news.newusers.questions news.software.readers sci.edu Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 196 Major USENET Newsgroup Hierarchies bit.listserv.* comp.* rec.* sci.* soc.culture.* Each of these "hierarchies" in this list of five contain numerous, very specific newsgroups which you may find interesting. For example, within "sci.*" are groups such as "sci.biology"and "sci.geo.meteorology". (The asterisk is standard computer shorthand for "this space might be occupied by much more text.") Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 197 TABLE 4: ELECTRONIC JOURNALS OF POSSIBLE VALUE TO K-12 EDUCATORS Currents: The use of computing in education. subscription: jebell%[email protected] Distance Education Online Symposium (DEOS) Distance education; many articles on K-12 issues. subscriptions: listserv%[email protected] message: SUB DEOS your-full-name To cancel a subscription, send mail to the same address, message UNSUB DEOS your-full-name. Effector Online: Computer based communication, esp. issues of freedom of speech, privacy, censorship, and policy subscription: [email protected] Ejournal: An electronic journal about electronic journals subscription: listserv%[email protected] message: SUB EJRNL your-full-name To cancel a subscription, e-mail to the same address, message UNSUB EJRNL your-full-name F.A.S.T. News: Articles, bibliographies, job listings, etc. on arts, science and technology. subscription: [email protected] Handicap Digest: Issues dealing with the handicapped. subscription: [email protected] via modem: Handicap News BBS (203) 337-1607 (300, 1200 and 2400 baud) (Fidonet 1:/141/420) Compuserve 73170,1064 History and Analysis of Disabilities Newsletter: News, and announcements of conferences, seminars, books, articles, theses, research, organizations dealing with the historical study of disabilities. subscription: fcty7310%[email protected] Impact Online: Social & ethical concerns of information technology subscription: [email protected] Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 198 ADDENDUM 1A: CONTACTS FOR REGIONAL INTERNET SERVICE PROVIDERS Network Name Service Locale Contact Name Phone Number E-mail Address BARRNET Bay Area, CA William Yundt (415) 723-3104 [email protected] CERFnet Los Angeles Area, CA CERFnet Hotline (800) 876-2373 [email protected] CICnet Midwest US John Hankins (313) 998-6102 [email protected] CO Supernet CO Ken Harmon (303) 273-3475 [email protected] CONCERT NC Joe Ragland (919) 248-1404 [email protected] JVNCNet Eastern US and International Sergio Heker (609) 258-2400 [email protected] Los Nettos Los Angeles Area Ann Westine (213) 822-1511 [email protected] MichNet/Merit MI Jeff Ogden (313) 764-9430 [email protected] MIDnet NE Dale Finkelson (402) 472-5032 [email protected] Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide MRNet MN Dennis Fazio (612) 342-0003\ [email protected] NEARnet Northeastern US (ME, NH, VT, CT, RI, MA) John Rugo (617) 873-2935 [email protected] NETillinois IL George Badger (217) 333-1637 [email protected] NevadaNet NV Jim Williams (702) 739-3557 [email protected] NorthWestNet Northwestern US (AK, ID, MT, ND, OR, WA, WY) Eric Hood (206) 562-3000 [email protected] NYSERNet NY Jim Luckett (315) 443-4120 [email protected] OARnet OH Alison Brown (614) 292-8100 [email protected] PREPnet PE Thomas Bajzek (412) 268-7870 [email protected] PSCNET PE, OH, WV (Supercomputer) Eugene Hastings (412) 268-4960 [email protected] Sesquinet TX Farrell Gerbode (713) 527-4988 [email protected] 199 Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide SDSCnet San Diego Area (Supercomputer) Paul Love (619) 534-5043 [email protected] SURAnet Southeastern US + Territories Jack Hahn (301) 982-4600 [email protected] TENET TX Tracy LaQuey Parker (512) 471-5046 [email protected] VERnet VA James Jokl (804) 924-0616 [email protected] WESTNET Western US (AZ, CO, ID, NM, UT, WY) Pat Burns (303) 491-7260 [email protected] WiscNet WI Tad Pinkerton (608) 262-8874 [email protected] WVNET WV Harper Grimm (304) 293-5192 [email protected] 200 Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 201 ADDENDUM 1B: CONTACTS FOR COMMERCIAL INTERNET SERVICE PROVIDERS AlterNet US and International (703) 876-5050 [email protected] ANS US and International Joel Maloff (313) 663-7610 [email protected] PSInet US and International PSI, Inc. (703) 620-6651 [email protected] Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 202 ADDENDUM 2: STATEWIDE EDUCATION NETWORKS AND CONTACTS This addendum is used by permission from a report entitled "Statewide Education Networks Survey Results" prepared by Barbara Kurshan and Marcia Harrington. Their contact information appears at the end of this document. In addition to contacts for particular state networks (indicated by BOLD print names), this list also includes the contact information for many other organizations or individuals who provided information about statewide networks for Kurshan and Harrington's report. These may be useful resources for your inquiries about state networking. Note that the survey was completed in January, 1991. Consequently some of the contact information may have changed, especially in light of the rate at which state networks are evolving. NETWORK CONTACT LIST BY STATE ALABAMA --Ron Wright Alabama DOE 3317 Gordon Persons Bldg Montgomery, AL 36130 205/242-8071 SDENET Rex C. Jones Alabama DOE 5327 Gordon Persons Bldg Montgomery, AL 36130 205/242-9590 ALASKA UACN Mike Cinij UAS 11120 Glacier Hway Juneau, AK 99801 907/789-4570 UACN Cathy Carney Alaska DOE Box F Juneau, AK 99811-0500 907/465-2841 ARIZONA Arizona EdLink John Cikalo EdLink 1900 W Thomas Ave Phoenix, AZ 85015 602/255-5061 --Kathryn Kilroy Arizona DOE 1535 W Jefferson Phoenix, AZ 85007 602/542-5024 CALIFORNIA --Vince Madden California DOE 721 Capitol Mall Sacramento, CA 95814 --Barbara O'Connor Educ. Techn. Commiss. Univ of CA at Sacramento Sacramento, CA Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 916/445-0775 916/278-6415 --Diane Rude Econ. Dev., Trade & Technology 1100 J Street, Suite 404 Sacramento, CA 95814 916/445-4591 CSUNET Craig Blurton California Techn Project PO Box 3842 Seal Beach, CA 90740 213/985-9631 203 COLORADO --Karen Sanstead Business/Education Partnerships 136 State Capitol Denver, CO 80203 303/866-2471 Colorado Learning Network Eric Feder Colorado DOE 207 Colfax Ave Denver, CO 80203 303/866-6859 CONNECTICUT --Linda Naimi Connecticut DOE 165 Capitol Ave Hartford, CT O6106 203/566-4987 --Sigmund Abeless Connecticut DOE 165 Capitol Ave Hartford, CT O6106 203/566-4825 Knowledge Network Betty Goyette --165 Capitol Ave Hartford, CT O6106 203/566-6660 SNET Thomas Buckley SNET 227 Church New Haven, CT 06506 --- DELAWARE University of Delaware William J. Geppert Dept of Public Instr Townsend Bldg Dover, DE 19901 302/739-4888 --Thomas F. Brennan Dept of Public Instr Townsend Bldg Dover, DE 19903 302/739-3721 FLORIDA SUNSTAR & FIRN Bill Schmid Florida DOE B1-14 Florida Educ Center Tallahassee, FL 32399 904/487-0911 --David Brittain Florida DOE Knott Bldg Tallahassee, FL 32301 904/488-0980 Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 204 GEORGIA GEIS Les Butler Georgia DOE 205 Butler Street Atlanta, GA 30306 404/656-2435 GC EduNET Frank Lowney School of Education Georgia College Milledgeville, GA 31061 912/453-4546 HAWAII PLATO Jon Nakasone Comp Center Keller Hall University of Hawaii Honolulu, HI 96822 808/956-2409 --James Bannan Hawaii DOE, Dist. Learning Techn 1302 Queen Emma St Rm 204 Honolulu, HI 96813 808/548-6990 Hawaii Intact. TV System C J Baehr Hawaii Public TV 2350 Dole St Honolulu, HI 96822 808/955-7878 IDAHO Northwest Star Schools Ken Reed Idaho DOE 650 W State Boise, ID 83720 208/334-2166 INDIANA KnowledgeNet Michael Huffman Educational Info. Systems Room 229 State House Indianapolis, IN 46204-2798 317/232/0808 IDEANet Michael Huffman Educational Info. Systems Room 229 State House Indianapolis, IN 46204-2798 317/232-0808 IHETS Mark D. Commons Intelenet Commission 17 W Market Street Indianapolis, IN 46204 317/685-8990 Electronic School District Michael Halla ESD 1000 E 17th St Bloomington, IN 47405 812/855-2222 UNI IOWA Communications Network IOWA Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide Bill Callahan College of Education University of Northern Iowa Cedar Falls, IA 50614-0615 319/273-2719 205 Dean Crocker Communications Division Hoover State Office Bldg Des Moines, IA 50319 515/242-6152 KANSAS --Denise Moore Kansas DOE 120 E 10th St Topeka, KS 66612 913/296-1230 KENTUCKY KET Lydia Wells Sledge Kentucky DOE 1825 Capital Plaza Tower Frankfort, KY 40601 502/564-2672 MAINE Community College of Maine Pamela MacBrayne University of Maine @ Augusta University Heights Augusta, ME O4330 207/622-7131 --Richard Riley Maine DOE Mail Sta. 23, Educ Bldg Augusta, ME O4333 207/289-5815 MENET (MaineNet) Blynn C. Currier Maine DOE University of Maine Augusta Augusta, ME 04333 207/621-0903 MASSACHUSETTS MASSNet Ann Von der Lippe MASSNet 6 St James Avenue Boston, MA O2120 617/727-9500 413/545-1955 UMASS Campus Network Randy Sailer University of Mass 239 Whitmore Admin Bldg Amherst, MA O1003 MICHIGAN Michigan Comm. College Network Michigan Info. Tech Network Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide Connie Julius Michigan Comm. College Assoc 2100 Michigan National Tower Lansing, MI 48933 517/372-4350 --Dan Schultz Michigan DOE PO Box 30008 Lansing, MI 58909 --- 206 Brian Raymond --4660 S Hagadorn East Lansing, MI 48823 517/336-1321 --Jamey Fitzpatrick Michigan DOE PO Box 30008 Lansing, MI 58909 517/373-1806 MINNESOTA MNSAT (Satellite & Technology) Penelope L. Dickhudt State Board of Voc. & Techn. Ed 130 Capitol Sq Bldg 550 Cedar St Paul, MN 55101 612/296-2256 --Joan Wallin Minnesota DOE 660 Capitol Sq Bldg 550 Cedar St Paul, MN 55101 612/296-1570 --Robert Price Control Data Corp 8100 34th Ave S Minneapolis, MN 55425 --- MISSISSIPPI --Pat Teski --102 Waterwood Drive Brandon, MS 39042 601/359-3778 MONTANA National Diffusion Network Ron Luckenbill Montana DOE, Public Instr. State Capitol Helena, MT 59620 406/444-2080 Big Sky Telegraph Frank Odasz Western Montana College Box 11 Dillon, MT 59725 406/683-7338 Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 207 NEBRASKA NEB-SAT Wayne Fisher Nebraska DOE Techn Center 301 Centennial Mall So Lincoln, NE 68509 402/471-2918 SERC, NEB-SAT Melodee Landis Nebraska DOE PO Box 94987 Lincoln, NE 68509 402/471-2918 NEVADA --Frank South Nevada DOE 400 W King Street Carson City, NV 89710 702/687-3136 NEW HAMPSHIRE --Bob Ross --PO Box 1100 Durham, NH 03824 603/868-1100 NEW JERSEY Educational Technology Network Ted Smorodin New Jersey DOE 225 W State Street, CN500 Trenton, NJ O8625 609/984-1805 NEW MEXICO --Kurt Steinhaus New Mexico DOE Education Bldg Santa Fe, NM 87501-2786 505/827-3806 --Mary Jane Vinella New Mexico DOE Education Bldg Santa Fe, NM 87501-2786 505/827-6569 Technet/Nedcomm Art St. George CIRT Univ of New Mexico Albuquerque, NM 87131 505/277-8046 Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 208 NEW YORK Technology Network Ties (TNT) Denis Martin NY DOE Room 860 EBA Albany, NY 12234 --Steve Kidder NY DOE University of State of NY Albany, NY 12234 518/486-6074 New York Network --William Halligan NY DOE Public Broad. Prog. 518/474-5862 --Michael S Radlick NY State DOE Elem. & Sec. Educ. Plan Albany, NY 12234 518/473-9106 Greg Benson New York Network AE Smith Bldg, 12th Floor Albany, NY 12225 518/443-5333 NORTH CAROLINA NCDLS Network Linda K. DeGrand NC Dept of Public Instr 116 W Edenton St Raleigh, NC 27603-1712 919/733-3193 NCDLS Network Elsie L. Brumback NC Dept of Public Instr 116 W Edenton St Raleigh, NC 27603-1712 919/733-3170 NORTH DAKOTA Higher Education Computer Network (HECN) Larry Isaak Vice-Chancellor for Administration State Capitol 600 E Boulevard Bismarck, ND 58505-0154 701/224-2960 Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 209 OHIO --Irene Bandy-Hedden Ohio Board of Education 65 South Front St Columbus, OH 43266-0708 614/466-3708 --Donna Boylan Ohio Board of Education 65 South Front St Columbus, OH 43266-0708 614/466-2329 Ohio Educ. Computer Network Herb Van Dyke Ohio DOE 180 E Engler St Columbus, OH 43266-0552 614/466-7000 Ohio Educ. Computer Network Gene Miltko Ohio DOE, Computing Serv 180 E Engler Columbus, OH 43266-0552 614/466-7003 Ohio Educational Broadcasting Blan Fuller Ohio Educational Broadcasting 2470 North Star Road Columbus, OH 43221 614/644-1714 OKLAHOMA Televised Instruction System Robert F. Parker OK State Regents 500 Educ Bldg, State Capitol Oklahoma City, OK 73105 405/524-9160 OREGON OR EdNet Ray Lewis Oregon ED-NET 7140 SW Macadam, Suite 260 Portland, OR 97219-3013 503/293-1992 OR EdNet James W. Sanner Oregon DOE --Salem, OR 97310 503/378-6405 PENNSYLVANIA PENN*LINK Ann P. Witmer PA DOE 333 Market Street Harrisburg, PA 17126-0333 717/787-1831 Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 210 RHODE ISLAND --Kenneth R. DiPietro RI DOE 22 Hayes Street Providence, RI 02908 401/277-2821 SOUTH CAROLINA SCNET Kemble Oliver University of South Carolina Center for Computers & Writing Columbia, SC 29208 803/777-5992 SERC-SC Bob Reese SC DOE 206 Rutledge Bldg Columbia, SC 29201 803/734-8090 SOUTH DAKOTA SD Public TV & Radio Networks Doris Spicer SD Public Broadcasting Box 5000 Vermillion, SD 57069 605/677-5861 TENNESSEE --Betty Latture Tennessee DOE Cordell Hull Bldg Nashville, TN 37219 615/741-0874 TEXAS TEA-NET Connie Stout Texas Education Agency 1701 N Congress Ave Austin, TX 78701 512/463-9091 Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 211 UTAH EDNET & UT Network for Inst TV Dale Steadman Utah DOE 250 East 500 South Salt Lake City, UT 84060 801/538-7947 --Helen Lacy 101 Gardner Hall University of Utah Salt Lake City, UT 84112 801/581-5852 VERMONT Vermont Interactive TV Judith Hastings VT Techn College PO Box 500 Montpelier, VT O5061 802/728-3391 Vermont Ed-Net Alan Kousen Vermont DOE 120 State Street Montpelier, VT 05620 802/828-3111 VIRGINIA VA.PEN Glen Bull Curry School of Education 405 Emmett Street Charlottesville, VA 22901-2495 804/924-7471 VA.PEN Cameron Harris VA DOE Info. Serv., P.O. Box 6Q Richmond, VA 23216-2060 804/225-2757(2099) WASHINGTON STEP/Star Schools Cheryl Lemke OSPI Old Capitol Bldg., FG-11 Olympia, WA 98504 206/586-2053 WEST VIRGINIA --Brenda Williams WV DOE 1800 Washington St E Charleston, WV 25305 304/348-2691 SATNET Bobbi Nicholson SATNET P.O. Box 707 Institute, WV 25112 304/766-2070 Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 212 WISCONSIN --Larry Dickerson WI Educational Communic. Board 3319 West Beltline Hwy. Madison, WI 53713 608/273-5501 STS/CDN Jody McCann Info. & Telecomm. Mgt P.O. Box 7844 Madison, WI 53707-7844 608/266-6700 CANADA W. Leigh Hull Alberta Educ Response Center 6240 113th Street Edmonton, Alberta T6H-362 403/422-6326 Anton Ljutic Champlain College 900 Riverside Dr St Lambert, Quebec J4P-3P2 We'd like to thank the following two people for allowing us to include the contact information, which they compiled, in this addendum. Barbara Kurshan mail: e-mail: phone: 4940 Buckhorn Road, Roanoke, VA 24014 kurshan%[email protected] kurshan@vtvm1 B.KURSHAN 71420,3512 (703) 774-0193 (Internet) (BITNET) (Applelink) (CompuServe) Marcia Harrington mail: e-mail: 5949 Village Lane, Roanoke, VA 24019 marciah%[email protected] marciah@vtvm1 (Internet) (BITNET) Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 213 ADDENDUM 3: COOPERATIVE NOT-FOR-PROFIT NETWORK PROVIDERS FrEdMail Foundation FrEdMail Foundation P.O. Box 243 Bonita, CA 91908-0243 contact: e-mail: phone: Al Rogers [email protected] (Internet) (619) 475-4852 K12Net Council (board of directors) Gordon Benedict Calgary, Alberta, Canada Voice phone: 403/228-0975; 229-9731 Sysop of 1:134/49 (403/228-9525 HST 403/229-0477 2400) UCAEDU.BITNET!BENEDICT K12Net Zone 1 Backbone Jack Crawford, W-FL Teacher Resource Center 3501-K County Rd. 20, Stanley, NY 14561 USA. Voice phone: 716/526-6431 Sysop of 1:260/620 (716/526-6495) Internet: [email protected] K12Net Zone 1 Backbone Janet Murray, Wilson High School 1151 S.W. Vermont St. Portland, OR, 97219 USA. Voice phone: 503/280-5280 Sysop of: 1:105/23 (503/245-4961) Internet: [email protected] K12Net Zone 1 Backbone Rob Reilly, Lanesboro School 188 Summer St. Lanesboro, MA 01237 USA. Voice phone: 413/443-0027 Sysop of 1:321/218 (413/443-6725) Internet: [email protected] K12Net Files Library Gleason Sackmann Box 5164 NDSU Computer Center Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 214 Fargo, ND 58105 USA Voice phone: 701/237-8109 Fax: 701/237-8541 Internet: [email protected] Sysop of 1:288/5 (701/228-2908) K12Net Echo Moderator Coordinator Mort Sternheim, Dept. of Physics and Astronomy University of Massachusetts Amherst, MA 01003 USA Voice phone: 413/545-1908 (W) 413/253-2252 (H) Sysop of 1:321/109 (413/256-1037) K12Net Zone 1 Backbone Andy Vanduyne Norwood Elementary School Norwood, NY 13668 USA Voice phone: 315/353-6674 Sysop of 1:260/375 (315/353-4565) K12Net Channel Coordinator National Public Telecommunications Network T.M. Grundner, Ed.D President, NPTN Box 1987 Cleveland, Ohio 44106 Voice: Internet: BITNET: CompuServe: (216) 368-2733 [email protected] aa001%[email protected] 72135,1536 Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide 215 Chapter 15: Using the Global Internet in K-12 Education NorthWestNet User Services Internet Resource Guide SECTION 6: EMPOWERING SCIENTIFIC RESEARCH Chapter 16: Using Supercomputers on the Internet ................................................................ 217 Using Supercomputers ............................................................................................. 217 Supercomputers: Growth and Future ........................................................................ 217 Supercomputers--Always a Need.............................................................................. 218 Supercomputer Sites................................................................................................. 218 The NSF Backbone .................................................................................................. 218 Supercomputer Hardware......................................................................................... 219 Supercomputer Software .......................................................................................... 221 Supercomputer Performance Gains .......................................................................... 221 Performance Gains Through Specialized Hardware.................................................. 222 Interaction with Optimizing Compilers .................................................................... 225 Migrating Program to Supercomputers ..................................................................... 229 Administrative Access.............................................................................................. 227 Supercomputer Glossary .......................................................................................... 227 Supercomputer References....................................................................................... 228 Chapter 17: Supercomputer Site Descriptions ........................................................................ 230 CORNELL NATIONAL SUPERCOMPUTER FACILITY (CNSF) ......................... 231 NATIONAL CENTER FOR ATMOSPHERIC RESEARCH (NCAR)...................... 236 NATIONAL CENTER FOR SUPERCOMPUTER APPLICATIONS (NCSA) ......... 240 NATIONAL ENERGY RESEARCH SUPERCOMPUTER CENTER (NERSC) ...... 247 PITTSBURGH SUPERCOMPUTING CENTER (PSC) .......................................... 251 SAN DIEGO SUPERCOMPUTER CENTER (SDSC).............................................. 259 Section 6: Empowering Scientific Research 216 NorthWestNet User Services Internet Resource Guide Chapter 16: Using Supercomputers on the Internet USING SUPERCOMPUTERS One of the primary purposes of many parts of the American portion of the Internet (particularly NSFNET) is to provide researchers easy access to supercomputing resources at a number of centralized supercomputer sites. This chapter provides an introduction to the basic principles of supercomputer use and includes detailed site descriptions for a number of the NSF-sponsored supercomputer facilities accessible through the Internet. SUPERCOMPUTERS: GROWTH AND FUTURE One of the most amazing phenomena of recent times has been the growth of the computer industry from a laboratory curiosity at the end of World War II to a major player in the economies of the world today, followed by rapid penetration into nearly all areas of life. The growth has been accomplished through extraordinary reductions in size and cost, and improvements in speed, reliability, and usability. Not long ago a new class of computers has emerged: supercomputers. By one definition supercomputers are "At any given time, that class of general-purpose computers that are both faster than their commercial competitors and have sufficient central memory to store the problem sets for which they are designed" [1]. By this definition, it might appear that supercomputers have been with us from the start, and differ only quantitatively from other computers. In fact, supercomputers are qualitatively different in that they employ different architectures which result in major differences in programming and use. According to the report "A National Computing Initiative" [2] the American research community will require a thousand-fold increase in computational power over the next few years. This growth is propelled by factors which are likely to exist for a long time to come. One reason is the dramatic change in international economic competition. Since World War II many countries, especially in Eastern Asia, have entered into the economic mainstream armed with a powerful combination of Western technology and indigenous cultural backgrounds. These countries are redefining many economic and industrial roles and are putting severe pressure on the American economy. Technological innovation, especially in leading-edge fields such as computers, is viewed as a major way to help our competitive stature. Another reason is that computers are assuming new roles. Computation is now recognized as the third mode of science, co- equal with theory and laboratory research [2]. Simulation of complex real world phenomena is increasingly possible and indeed necessary for future advance: investigations of very large (galaxies), very small (electron orbits), very fast, very slow, very complex, dangerous, or highly energetic phenomena are often possible only through simulation. Computers can also provide "impossible views" of objects under conditions which can never be obtained physically. Finally, human activities are causing changes in the natural world: developments such as pollution, the destruction of rain forests, ozone depletion, and the greenhouse effect, require extensive monitoring and modelling which would be impossible without the computational and data management capabilities of supercomputers. Chapter 16: Using Supercomputers on the Internet 217 NorthWestNet User Services Internet Resource Guide SUPERCOMPUTERS--ALWAYS A NEED The enormous progress in computer hardware will result in a "desk-top-CRAY" in the near future. With such powerful personal computers will we still need supercomputers? The answer appears to be yes. However powerful PC's become, there will always be problems which strain the leading edge of whatever computational powers we develop. The objects of study of disciplines such as mathematics (especially combinatorial problems), and the physical, biological and social sciences are infinitely complex, and computer simulations can never exhaust analytical possibilities. Many simulations today scrape by with the coarsest possible resolution in the hope that important details are not neglected. Increased resolution can come only at great computational cost: for example, a ten-fold increase in spatial resolution in each of 3 dimensions translates into a thousand-fold increase in computational operations. Naturally, manydimensional problems would require much greater increases. The combined requirements of computational power, data storage, and data flow should insure the continued need for supercomputer sites. SUPERCOMPUTER SITES By their very nature, supercomputers are expensive and require extensive hardware, software, documentation, and personnel support in order to function. Vast computational performance must be matched by massive data storage capacities, large data flows, high resolution output devices, an extensive communications interface, as well as a wealth of software applications, libraries, documentation, and expert consulting. A number of supercomputer sites are currently promoted as national research centers. They are focal points for the collection and distribution of software, documentation, and extensive sets of examples; for training programs, seminars, and symposiums for high-performance graphics laboratories for visualization; and communication facilities in the form of e-mail, lists, and bulletin boards for specialized user groups. The wealth of different services available at supercomputer sites implies that you should shop carefully in order to locate a site which best matches your needs. The types of software (editors, languages, packages, and operating systems), hardware (memory size and structure, vector and parallel hardware), and services (graphic output, type of consulting) affect the appropriateness of a site to your intended uses. For example, some systems couple high performance vectorization with somewhat limited memories, others feature very large memories with limited vectorization capabilities, whereas others specialize in massively parallel systems. THE NSF BACKBONE Supercomputers were born in the U.S. but were generally unavailable to university scientists because of their high costs. Some American scientists actually went to Europe to obtain time on U.S.-built supercomputers. Recognizing the importance of computing access, the NSF established five supercomputer centers across the nation in 1984. Time on these machines is obtained mainly through several grant mechanisms and is otherwise free of charge. The NSF also helped establish a communications network, called the NSF backbone, which connects these centers and links them to regional networks. Chapter 16: Using Supercomputers on the Internet 218 NorthWestNet User Services Internet Resource Guide Originally, the centers were deliberately designed to differ from one another in order to make make more options available to researchers, and to test out a variety of novel machine architectures, operating systems, and support strategies under real-life conditions. Recently, however, the systems have converged around several models of CRAY computers, IBM 3090s, and the new massively parallel Connection Machines, mostly running slight variants of Unix. SUPERCOMPUTER HARDWARE Supercomputers are not just big, fast machines that use state-of the-art hardware; they also feature special architectures. While these architectures can greatly boost performance, their full power can only be exploited under certain conditions and often require that the program and/or problem itself be restructured by someone who understands how these architectures function. The most common supercomputer architectures include special memory organization, such as cache memories in the IBM 3090, or independent memory banks in the CRAYs, vector hardware (also called pipeline hardware) present in nearly all supercomputers, and parallel hardware, usually in the form of multiple processors. All of these features have recently started to appear on non-supercomputers, but their implementation and support are especially well developed on supercomputers. Cache Memories For a given price, memory can either be big and slow or small and fast. A cache is a small and very fast memory which serves as a buffer to a large slow memory; therefore, cache memories can, under certain conditions, improve overall performance by reducing the time to access main memory. When an operand is fetched from main memory, both it and a number of its nearest neighbors are placed in the high speed cache. If the next reference is to a neighbor, it will be taken from the cache instead of the main memory. If memory usage in the program tends to be highly clustered, then the program operates mainly out of the cache and performance increases greatly. On the other hand, if memory usage is highly scattered, then the cache memory can actually degrade performance. Independent Memory Banks Independent memory banks are another way of speeding memory access and storage. A reference to a given bank of memory cells ties up the bank for a number of machine cycles, and no further access is possible until the bank is free. Some computers arrange memory into a number (64 on the CRAY) of independent banks so that most memory references address different banks and do not interfere with one another. Typically the banks are arranged so that adjacent words, such as X(1), X(2), X(3), reside in different banks. For example, the loop DO 10 I=1,N runs faster with an independent memory bank architecture since the storage times for X(1), X(2), X(3), X(4) etc., are overlapped. However, array structures or patterns of array access which are discordant with the memory architecture can defeat the architecture and slow execution considerably. For example, on a 64 bank memory the following code: DIMENSION X(64,50) Chapter 16: Using Supercomputers on the Internet 219 NorthWestNet User Services Internet Resource Guide DO 10 J = 1,50 10 X(1,J) = 0.0 would nail the same bank each and every time through the "J" loop, since X(1,1), X(1,2), X(1,3) etc. reside in the same bank. In this case the problem can easily be solved by redimensioning X as X(65,50) in order to change the memory layout. Vector Hardware Vector hardware is currently the most widespread and mature of the special architectures found in supercomputers. Vector units consist of CPU components such as add or multiply units which are divided into a number of sequential stages or segments. The units typically accept two vectors of numbers which proceed through the segments and emerge out the other end as a vector of results. As long as the vectors continue to flow, the process is efficient, and speedups by a factor of 5 or 10 are not uncommon, but starting and stopping the units for short vectors can actually increase execution time. Efficient vector operation often requires some restructuring of code by the programmer as well as the use of compiler directives to monitor and control the process. A more complete description of vector operations appears later in this document. Parallel Hardware Parallel architecture distributes the processing of a single program over a number of different physical processing units. It offers the greatest potential for vast increases in performance of any known architectural layout. For example, a machine with 10,000 processors might solve some problems almost 10,000 times more quickly than a single processor machine. However, most programs cannot be partitioned so completely into independent units, and many difficult hardware and software issues remain unsolved and are the subject of intense research. At present, limited parallelism can be exploited on the IBM 3090 and CRAYs, and massive parallelism is possible with the Connection Machine. The effort needed to restructure code ranges from about the same as for vectorization to considerably more. A more complete description of parallel operations appears later in this document. Impact on Debugging and Graphics Supercomputers are so powerful and generate such vast amounts of information that they force major changes in both debugging techniques and in the presentation of output. Ad hoc debugging techniques are woefully inadequate for dealing with, say, an error in the 471,000-th iteration of a 500 variable program operating on 18 million separate values. Special debugging software is required which lets you examine values, restart code at various points, observe the effects of changes in values, run controlled experiments, etc. Similarly, traditional printed and even standard graphical output is often inadequate to represent the millions or even billions of separate data values that can be provided by a supercomputer run. The term "visualization" is the latest buzzword used to describe the sets of advanced graphical techniques which address this problem. Visualization often involves high resolution displays, extensive use of color, 3D representations, and extensive interactive control of the image in order to control the viewing angle, collapse dimensions in a multi-dimensional data set, or perform image processing functions in order to extract or highlight desired information. Existing graphics packages are often insufficient for the task as they emphasize the display of 2- and 3-dimensional XY, XYZ, or contour plots, whereas the representations of complex simulated phenomena require some combination of image processing Chapter 16: Using Supercomputers on the Internet 220 NorthWestNet User Services Internet Resource Guide approaches along with more standard graphic techniques. In addition, graphics place severe demands on data transmission as well as real time interaction. Other Hardware Issues Other hardware issues include memory size and use of high speed peripherals, such as the Solid State Disk (SSD), available on some CRAYs. The hardware available at different supercomputer sites should be a major consideration in your selection. For example, a CRAY Y-MP is extremely good for highly optimized vector operations, but is somewhat limited in terms of memory, an IBM 3090 has an immense memory but only modest vector performance, and a Connection Machine is much superior for highly parallel problems. SUPERCOMPUTER SOFTWARE Supercomputer sites are often endowed with a rich collection of applications software in the areas of Chemistry, Physics, Engineering, Mathematics, and Graphics. Computer languages, however, are confined mainly to FORTRAN, Pascal, and C, and FORTRAN is the only language that is extensively optimized for vector/parallel operations at all sites. Operating Systems While the early sites featured a variety of operating systems, most have converted to variants of Unix (UNICOS on the Crays, AIX of the IBM 3090, and Ultrix on some front ends), and CMS which shares the 3090 with AIX. A few sites also offer VMS font ends. Workstation Support Some sites provide extensive support for Workstation and PC software to be used in conjunction with the supercomputer or its front end. NCSA at Illinois, for example, provides free downloadable graphics and communications software for PCs, SUNs, and Macintoshes. Software is probably the single most important consideration in site selection. Unfamiliar languages or editors can greatly increase learning time; programs, data files, and data formats may have to be restructured to move to a particular environment, and future portability must be kept in mind; nonFORTRAN programs may have to be rewritten or run in a non- or sub- optimized mode; and major applications programs, libraries, or graphics libraries may be unavailable or at different revision levels. SUPERCOMPUTER PERFORMANCE GAINS Despite the many "fringe" benefits of supercomputer sites, such as access to software, training, graphics, and collaborative research, the main purpose in using supercomputers is to exploit their size and speed in order to handle otherwise intractable problems. The performance of supercomputers is due mainly to two factors: Chapter 16: Using Supercomputers on the Internet 221 NorthWestNet User Services Internet Resource Guide ❏ Supercomputers are generally big, fast machines which employ high performance technology. As a result, all computer programs automatically benefit. ❏ Hardware architectures, such as cache memory, independent banks, instruction stacks, high speed I/O, vector, and parallel operations which, although not unique to supercomputers, are usually more highly developed. The exploitation of these features is partly automatic but can also benefit significantly from modifications by the programmer. Vector and parallel architectures are most often emphasized in optimization, but attention to the other architectures mentioned above can bring about major performance gains as well. One should also note that (a) extensive optimization should only be done in conjunction with special timing tools which locate those portions of the program which can benefit most, and (b) optimization should only be carried to a certain degree--smarter compilers in the near future will be able to optimize well structured code much better than the "spaghetti" code that often results from overzealous hand optimization. PERFORMANCE GAINS THROUGH SPECIALIZED HARDWARE The most significant performance gains are obtainable through vector processing and parallel processing hardware. Vector Processing Vector processing can best be explained through analogy. Imagine a factory which assembles 6-bladed airplane propellers. It has 6 people, p1,p2,...,p6, at 6 workstations who attach each blade in turn to the hub. Person p1 receives a tray with the parts and assembles the first blade to the hub. When done, he passes the tray along with his partial assembly to p2. P2 attaches the 2nd blade and when done passes the tray and his partial assembly to p3, and so on. Of course, when p1 has passed his partial assembly to p2 he does not just quit for the day. Instead he immediately gets a new tray and starts a new assembly. Similarly, p2 no sooner finishes his assembly when he gets the tray and the partial assembly from p1 and begins attaching the second blade. After 6 time periods, the above pipeline is filled with 6 different stages of assembly. The important point to note is that while it still takes 6 time periods to assemble any given propeller, a new finished propeller emerges from the assembly pipeline each and every time period. We have speeded up the assembly process by a factor of 6 by using 6 people in a quasi-parallel manner. Note that even if a product required 10,000 stages to assemble, the products would still emerge at the rate of 1 per time period. In other words, production speed is independent of the complexity or length of the assembly process. On the other hand, if the pipeline is interrupted for any reason, a very long pipeline (or assembly process) will take much longer to restart than a short one. In supercomputers, the vector or pipeline process is usually applied to arithmetic units, such as add, multiply, or divide units which "assemble" new numbers from the vectors of input numbers. For example, a multiply unit on the CRAY contains 7 stages. The FORTRAN code DO 10 I = 1,60 10 C(I) = A(I)*B(I) Chapter 16: Using Supercomputers on the Internet 222 NorthWestNet User Services Internet Resource Guide is converted to vector instructions which start loading the vectors A(1), A(2),... and B(1), B(2),... into special vector registers. As soon as the first pair is available, A(1) and B(1) enter the multiply unit to begin the first stage of multiplication. At the end of one clock cycle, the partial multiplication of A(1)*B(1) moves to the 2nd stage in the multiply unit, and A(2), B(2) enter stage 1; at the end of the 2nd cycle, A(1)*B(1) moves to stage 3, A(2)*B(2) moves to stage 2, and A(3), B(3) enter stage 1. This process continues and at cycle 7 all seven stages are being utilized, the fully multiplied value of A(1)*B(1) emerges and is stored in C(1), and A(8), B(8) get ready to enter stage 1. From then on, a new multiply is finished every clock cycle, even though it takes 7 cycles to complete one multiply. We have increased the speed almost by a factor of 7 (except for initiating the pipeline). Vectorization only applies to explicit DO-loops in FORTRAN and their equivalents in other languages. Only one loop within a nest of loops can be vectorized, but the software automatically selects the loop unless that choice is overridden by directives from the programmer. There exist many obstacles to vectorization, some of which are easily overcome (for example, changing the order of statements), some which require use of compiler directives to modify the vectorization process, and some which require major restructuring of the code. On high performance vector machines, such as the CRAY, speedups of a factor of 5 or 10 for that portion of the code that can be vectorized are not uncommon. Parallel Processing The basic idea of parallel processing is easier to grasp than vector processing, but the usage, implementation, and many of the concepts are more difficult. On the other hand, the rewards may be much greater since the potential speedup is proportional to the number of processors available, whereas vector speedup can never be much more than a factor of 10. Parallel systems distribute the work of a program or subroutine among a number of processors. In some implementations, such as CRAY Macrotasking, the number and operation of parallel processors must be predetermined; in other implementations, such as CRAY Microtasking, the number, identity, or order of execution of the processors is unknown and variable (this has many consequences which influence the structure of a parallel program and hence the modifications needed to convert an existing program to parallel operation). Most of the following discussion applies to CRAY Microtasking. Some of the concepts of parallel processing are illustrated by the execution profile of subroutine ABC: SUBROUTINE ABC (Block B1) (Block B2) (Block B3) a block of code executed by one processor another block executed by a processor another block executed by a processor RETURN END The subroutine is entered at the top under the control of a single processor, after which control is transferred to one, two, or three other processors for blocks B1, B2, and B3. When all of the blocks are finished, control is returned to a single processor which terminates the subroutine. The execution profile might look like this: Chapter 16: Using Supercomputers on the Internet 223 NorthWestNet User Services Internet Resource Guide 224 Time Processor 1 Processor 6 Processor 4 1 2 3 Start ABC Run B2 x x Run B1 x x Run B3 Exit ABC where "x" means the processor is idle or engaged with another program. The profile is generally unpredictable and the actual number and identity of processors depends on many factors. Because of this unpredictability, the parallel operation is often referred to as a "fray." A DO-loop is a special case of the above structure: SUBROUTINE ABC DO 10 I = 1,3 (the i-th iteration of the loop is block B(i) 10 CONTINUE RETURN END in which some iterations of the loop may be handled by different processors. Some obvious and not-so-obvious consequences derive from such an implementation. The different code blocks must be totally independent of the sequence in which they are processed: Block 3, for example, cannot depend on the results of, say, Block 1. It is less obvious that local variables assigned values inside a block can have no validity outside the block, that values associated with loop iterations must be explicitly tied to the loop index, and that global variables which are not indexed by a loop index must be "guarded" from simultaneous access. Consider the following section of code: K=0 DO 10 I = 1, 1000 K=K+1 10 CONTINUE The operation of the above loop depends on whether K is local or global. Local variables in a parallel block of code are replicated for each processor that joins in the "fray" whereas global variables occupy a single location which is accessed by all processors. Suppose that K is a local variable and the 1000 iterations of the loop are randomly distributed among, say, 64 processors. Then processor 17 might handle 23 iterations of the loop, processor 39 might handle 11 iterations, and so on. At the end of the loop, if control is assigned solely to processor 17 then K=23, if assigned to processor 39 then K=11, whereas in a non-parallel environment K always equals 1000. Inside the loop, if K is used as a substitute for the loop index, then its value depends only on how many times that processor has handled the loop, and so will generally have little relation to the value of the loop index itself. Thus A(K) rarely is the same as A(I), whereas in a non-parallel environment it is always so. If K is a global variable then it must be guarded from simultaneous access by more than 1 processor. For example, suppose that K=0 and processors 13 and 19 begin execution of RK=K+1S at slightly different Chapter 16: Using Supercomputers on the Internet NorthWestNet User Services Internet Resource Guide times. If 19 accesses the expression before 13 has finished, then K will be reset to 1 instead of being set to 2 as it should be. This type of code is called a "critical section" and must be guarded by explicit directives which guarantee that another processor can only enter that section of code when the current processor has finished. Parallel and vector processing are quite compatible and can be used not only in the same program but often in the same nest of loops. For example, some compilers analyze a DO-loop nest and select one loop for vectorization and another for parallel processing. On the CRAY, a single loop can be partitioned into vectorized and parallelized sections. INTERACTION WITH OPTIMIZING COMPILERS The goal of an optimizing compiler is to speed the execution of a program without changing the results. It scans the user's source code and identifies structures which can utilize the special hardware found in supercomputers. Since the conditions under which these structures can be safely optimized are very limited, it must analyze much of the surrounding code to determine if, and to what degree, the code can be optimized. The compiler is subject to several important constraints which limit its effectiveness. Since the optimization is done at compile time it can have no knowledge of the run-time structure of the job. Thus, input data values which may change the flow of execution and the degree of optimization cannot be considered, so the compiler has to assume the worst case and do the least amount of optimization. Another constraint is that optimization is often limited to the scope of a single routine, and interactions between routines which might affect optimization cannot be taken into account. In addition, the technology of optimizing compilers is continually advancing, and any given compiler may be unable to optimize code which later versions can handle. Because of these limitations it is often necessary for the programmer to supply auxiliary information which eliminates ambiguity and resolves problems which the compiler cannot handle. This is especially important in parallel processing, but is also often required in vectorization. The programmer supplies global directives on the compile statement or embeds local directives in the source code, or both, which guide the optimization process. For example, the following loop would be rejected by any vectorizing FORTRAN because of a "recurrence" relation in the loop: K = IVAL DO 10 I = 1,N 10 A(I) = A(I-K) + 1.0 While "recurrence" and other inhibitors of vectorization are beyond the scope of this report (see [4] and [5] for more information), the above code can be vectorized on a CRAY provided that (a) K is negative, or (b) K is greater than 64. If the programmer knows this he can insert compiler directives which force the compiler to vectorize. Thus the code CDIR$ IVDEP DO 10 I = 1,N 10 A(I) = A(I-K) + 1.0 ("ignore vector dependency") in effect, tells the compiler that "I know more than you, so forget your inhibitions and vectorize anyway." Chapter 16: Using Supercomputers on the Internet 225 NorthWestNet User Services Internet Resource Guide Parallel optimization usually requires more embedded directives than vectorization. It is frequently necessary to explicitly prevent multiple processors from accessing code until all processors have finished operating on a previous section. For example, the CRAY compiler directives (see [6]) CMIC$ DO GLOBAL DO 10 J = 1,N (operation on the J-th column of A) 10 CONTINUE CMIC$ DO GLOBAL DO 20 I = 1,M (operation on the I-th row of A) 20 CONTINUE would distribute the operations of the N columns of A and the M rows of A to different processors, but would assure that all columns were finished before any rows were processed. The directives are signaled by "CMIC$" (for Microtasking) in columns 1-5 and apply to the next DO-loop. Thus the start of the second "CMIC$" terminates the first "CMIC$" and tells the compiler that the two loops are to be processed in sequence. MIGRATING PROGRAM TO SUPERCOMPUTERS The main point in using supercomputers is to achieve dramatic increases in processing speeds. The increases are partially due to the fact that supercomputers are simply big and fast computers, but much of the increase comes from the special architectures that supercomputers employ. Achieving a high degree of optimization on supercomputers requires a well thought-out strategy as well as realistic expectations as to what can actually be achieved. The maximum gains that can be obtained through parallel processing or vectorization are controlled by "Amdahl's" law [1]: P = 1/(1-X+X/a) where P is the performance gain, X is that ratio of the code which can be optimized (vectorized or processed in parallel), and "a" is the speedup ratio for vector or parallel code. The important part of the law is that the performance is much more controlled by X, the proportion of the code that can be optimized, than by "a." For example, suppose that X = 0.80, so that 80% of the code can be vectorized or processed in parallel. Then the absolute maximum speedup possible is a factor of 5, even if vector or parallel operations are infinitely fast (that is, even if "a" is infinity, then P = 1/(10.8 + 0.8/infinity) = 1/(0.2) = 5 ). Note that it is rare for X to exceed 0.8 (factor of 5 speedup) for vector processing applications, whereas X may often exceed 0.99 (factor of 100 speedup) for parallel processing applications. The first step in migrating code to a supercomputer (after making any adjustments to insure that the FORTRAN code will actually compile and run), is to instrument the program in order to identify "hotspots," that is, code which is extremely CPU intensive. A good candidate program for optimization should have an execution profile such that nearly all of the CPU time is spent in just a few percent of the code (if the execution profile is fairly uniform, then hand optimization may be a waste of time). Most supercomputer sites provide easily used compiler directives or other tools which will show you a histogram of CPU time spent versus source code. If the program has identifiable hotspots, the next step is to read and understand the compiler messages which identify obstacles to optimization. For example, the IBM 3090 compiler provides an in depth analysis of each loop, which identifies not only the obstacles to vectorization, but also the results of an "economic" analysis to determine which loop in a nest of loops yields the best results. Chapter 16: Using Supercomputers on the Internet 226 NorthWestNet User Services Internet Resource Guide 227 At this point you should analyze the loops highlighted by the compiler to see if any can be replaced by routines from existing optimized libraries, such as the ESSL routines on the IBM 3090. Many such routines are coded in assembly language and are optimized to a very high degree. After this, you should attempt to remove inhibitors to optimization by making local modifications to loops. In many cases this can be done simply by reordering statements, splitting loops, or adding compiler directives. For example, the loops on the left will not vectorize, while the loops on the right (which produce exactly the same results) will: 10 DO 10 I=2,N B(I) = A(I-1) A(I) = C(I) 10 DO 10 I=1,N DO 10 J=1,N A(I,J)=A(I,J-1)*B(I,J) 10 DO 10 I=2,N A(I)=C(I) B(I) = A(I-1) 10 DO 10 J=1,N DO 10 I=1,N A(I,J)=A(I,J-1)*B(I,J) In the above examples, a "recurrence" relation existed which prevented vectorization. In the following example, the recurrence relation could not be avoided for one expression, but by splitting the loop into two parts, one of the two expressions on the right can be vectorized: 10 DO 10 I=1,60 A(I)=B(I)*C(I) D(I)=D(I-1)*E(I) 10 20 DO 10 I=1,60 A(I)=B(I)*C(I) D(I)=D(I-1)*E(I) When these steps have been taken, further optimization can be achieved by paying careful attention to memory layout or by restructuring the program to obtain the best match between program structure and the architecture of the machine. The latter is, of course, a very time consuming operation and should only be undertaken when the benefits and the costs are fully considered. ADMINISTRATIVE ACCESS Resources on all of the NSF sites and some of the other sites are mainly allocated on the basis of grants, rather than by money. Three main grant types are commonly available: ❏ Large allocations which are subject to formal peer review boards which meet at scheduled times during the year. These boards are comprised of personnel which may be from the site, jointly from several sites, or from NSF. ❏ Small allocations for startup or familiarization purposes. These are usually available at any time throughout a year. ❏ Block grants awarded to Universities. The Universities allocate sub blocks of time through their own review boards. SUPERCOMPUTER GLOSSARY The following glossary defines some of the terms used in this report. A much more complete glossary of supercomputer terms appears in reference [1]. Chapter 16: Using Supercomputers on the Internet NorthWestNet User Services Internet Resource Guide CGM: an acronym for Computer Graphics Metafile. It is a GKS standard metafile which contains generalized plot instructions which can then be converted to drive a specific graphics device. ETHERNET: a network scheme which uses the Carrier Sense, Multiple Access, and Collision Detect (CSMACD) method of attaching hosts to it. The Ethernet can be used with a number of protocols including TCP/IP and DECNET. FILE SERVER: a computer system that permits network users to create or access files. FTP: an acronym for File Transfer Protocol. This is a commonly used program that reliably transfers files between two computers on a network. GBYTES: a billion bytes of information. GKS: an acronym for Graphics Kernel System. An internationally recognized standard for creating graphic images on a computer. HPGL: a plot format specifically designed for certain models of Hewlett-Packard plotters. MAC: short for Macintosh computer. MBYTES: a million bytes of information. MASS: a mass storage facility commonly used at supercomputer sites to store large amounts of semipermanent data for each user. METAFILE: a generic graphics file which is not designed to drive any existing graphics device but which can be converted to any specific graphics device. MEMORY BANK: a region of memory in a computer which has a single access path to it. Any access to a bank blocks all other accesses until it is complete. MFLOPS: millions of floating point operations per second. MWORDS: millions of computer words. NS: a nano-second, or one billion-th of a second. POSTSCRIPT: a text and graphics language designed especially for "Desk Top Publishing" environments. SSD: an acronym for Solid State Disk, a very large high speed semiconductor memory that serves in place of a rotating disk, but is much faster. TELNET: a program that permits a user at one computer to login to another computer. T1: a telecommunications medium that allows data to be transmitted at a speed of 1.544 megabytes per second. The NSF backbone and much of NorthWestNet operate at T1 speeds. VISUALIZATION: a collection of techniques which make it possible to display the results of calculations. It includes, but it not confined to, standard graphical displays such as line or contour plots. It is especially useful to compress the vast amount of information generated by supercomputers into a comprehensible form. SUPERCOMPUTER REFERENCES [1] "Supercomputing: An Informal Glossary of Terms," IEEE Washington Office, 1111 Nineteenth Street, NW, Washington D.C. 20036. 1987. [2] H.J. Raveche, Duncan H. Lawrie, Alvain Despain, "A National Computing Initiative-An Agenda for Leadership." Society of Industrial and Applied Mathematics, 1400 Architects Building, 117 So. 17th Street, Philadelphia, PA, 19103-5052. 1987. [3] Norris P. Smith, "Of Supers and Minisupers," Computer Graphics World, August 1988. [4] Helen M. Doerr, Francesca Verdier, "Improving Vector Performance," and "Introduction to Vectorization," Cornell National Supercomputer Facility, Cornell University, Ithaca, New York, September 1987. Chapter 16: Using Supercomputers on the Internet 228 NorthWestNet User Services Internet Resource Guide [5] David D. Soll, "Vectorization and Vector Migration Techniques," IBM Technical Bulletin, SR204966-0. Chapter 16: Using Supercomputers on the Internet 229 NorthWestNet User Services Internet Resource Guide 230 Chapter 17: Supercomputer Site Descriptions The following section provides detailed information about six NSF-sponsored sites which provide supercomputer services for NSF sponsored researchers. The purpose of these site descriptions is to allow you to do some preliminary comparisons of each site's hardware, software, and training programs so you can select the supercomputer site which would be most appropriate for your particular research needs. All of the site descriptions were reviewed or contributed by representatives of each site's user services staff in September, 1991. We'd like to thank the following individuals for their participation: Supercomputer Site Reviewed By Cornell National Supercomputer Facility National Energy Research Supercomputer Center Pittsburgh Supercomputer Center National Center for Atmospheric Research National Center for Supercomputer Applications National Center for Supercomputer Applications San Diego Supercomputer Center Blaise Barney Jean Schuler Deb Nigra Juliana Rew Lyle Rigdon Melissa Johnson Mark Sheddon Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 231 CORNELL NATIONAL SUPERCOMPUTER FACILITY (CNSF) Computer Hardware ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ Two IBM ES/3090 600J, with 6 vector facilities each 512 Mbytes main memory each 827.6 Mflops maximum speed 266 Gbytes of disk storage 896 MBytes of memory available to each user application Both vector and parallel processing hardware 2 Sun workstations Stellar Graphics Supercomputer Graphics hubs across Cornell campus Software ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ AIX operating system for both 3090s (CMS still available as well) Software support for vectorization, including vectorizing compiler and vector libraries Interactive and batch modes Editor: IBM Xedit Text Processors: SCRIPT/VS (includes MFF), TeX FORTRAN: VS FORTRAN, PTOOL FORTRAN aids Other languages: Assembler, C, EXEC, EXEC2, LISP, PASCAL, PL/I, PROLOG, REXX, APL2 (vectorized) PUBLIC: public domain user contributed and supported software Chemistry ALCHEMY II DISCOVER 2.5.1 KGNMOL AMBER GAMESS MELDF AMPAC GAUSSIAN 88 MOPAC CHARMm HONDO 7PF & 8 VENUS DYNA3D HSPICE Computational Fluid Dynamics FIDAP Electronics HSPICE 8907 Engineering ABAQUS SUPREM III ESSL VSPICE Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 232 FORTRAN Utilities & Debuggers FORTRAN IAD ROAFP FORTAUX UTILITY DI-3000 graPHIGS 2.1 TELL-A-GRAF DISSPLA 11.0 GRAPHIT VIEW GDDM NCAR BSPLINE ESSL 3 & 4 GAMS/MINOS LLSQ ODEPACK SCRATCHPAD II CERNLIB FFTPACK IMSL 11 MAPLE 4.0 QUADPACK SLATEC 3.2 ASSEMBLE FORTRAN VS 2.3 PARALLEL FORTRAN C/370 1.1 FORTRAN VS 2.4 PASCAL VS 1.2 EXEC HASM PL/I OPT. 2.3 SIMSCRIPT II.5 SLAM II 4.03 BMDP88 SAS 5.18 EDA SAS/IML GLIM 3.77 TSP NTSYS 4.6 PASSTHRU PTOOL PDF SyncSort PIPELINES TOOLS PS INTERPRETER VM BATCH Graphics CONPLOT GDQF SAS/GRAPH Mathematics and Numerical Libraries ACMALG EISPACK 3 FISHPACK LAPACK MATHADVANTAGE RECIPES TOEPLITZ ACRITH 1.3 ELLPACK FUNPACK 2 LINPACK NAG 13 REDUCE 3.3 Mechanics ABAQUS 4.8.4 ANSYS 4.4 Programming Languages APL2 EXEC2 LISP VM REXX Simulation GPSS/H 1.99 Statistics Utilities Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 233 Training ❏ ❏ ❏ ❏ ❏ ❏ Introduction to systems, access, languages, and optimization tools for new users Summer institutes for researchers working on code Undergraduate/Faculty workshops Workshops on parallel processing and vectorization Computational Chemistry workshops Visualization and remote graphics workshops Collaborative Research ❏ ❏ ❏ User groups and Research Interest Groups (Computational Chemistry and Statistics) Interdisciplinary research groups open to all researchers Corporate Research Institute Documentation ❏ ❏ ❏ ❏ ❏ Online documentation: BOOKMGR, CNSFINFO, CUINFO Newsletter: ForeFronts Training notebooks of presentations from classes and lab exercises Online instruction Program: TUTOR Online help program and man pages Consulting ❏ ❏ ❏ ❏ ❏ ❏ E-mail consulting Large scale computing consulting Computational Research Associate Staff in Chemistry, Statistics, Operations Research, Astrophysics, Mathematics, Engineering, and Agricultural and Biological Engineering Visualization consulting Strategic User Program for those using parallel computing in production work Corporate Research Consulting Graphics Support ❏ ❏ Support for remote X-Windows (including xim with WaveFront) Tektronix 4105, 4010; Versaterm for Mac; GRAF for PC; VT100 emulators; gnuPLOT and a version of xmovie An extensive graphics lab with high speed fiber optic links, an image processing system, facilities for videotape production, a digital camera for 35 mm slides, printers for producing camera ready copy, plotters and color PostScript printers, and a number of IBM and Unix workstations Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 234 Strengths and Limitations Strength parallel processing and very large memory Limitation limited vector processing (as compared with a CRAY) Administrative Allocations are approved at Theory Center at CNSF by a peer review process; small startup grants may be made before peer review process is complete. Contact Summaries Consulting: Technical and visualization consulting: (607) 254-8686 [email protected] (607) 254-8686 (607) 255-3985 [email protected] Allocations: Pat Colasurdo (607) 255-3985 [email protected] Training: (607) 254-8686 System Status: (607) 255-7138 Network help: Network Management Center (24 hrs/day, 7 days/week) (607) 255-9900 IBM 3090 addresses: cornelle.tn.cornell.edu (128.84.252.7) cornellf.tn.cornell.edu (128.84.252.21) eagle.tc.cornell.edu (AIX) (128.84.201.1) Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 235 Login Script The following script shows how to connect to the CNSF IBM, login, compile, load and run a program, and then logout. It assumes that you connect from some local machine which supports the TCP/IP TELNET program. Note that if you are login in from a VMS machine, you will need to use TN3270 to access CNSF. Prompts are represented by "user>>" for you, "CNSF>" for the IBM, "TELN>>" for TELNET, and "CNus>>" for IBM responses followed by user entries on the same line. Most responses are abbreviated. Comments are enclosed in parentheses. Note that this dialog has been tested. Prompt Dialog Comments user>> TELN>> CNSF>> CNSF>> CNus>> CNSF>> telnet 128.84.252.21 (TELNET to the IBM) ... (TELNET messages) LOGON user-id ENTER PASSWORD OR LOGOFF (IT WILL NOT APPEAR WHEN TYPED): password system messages fortvs hello (Compile the program) ... (Compiler messages) CNus>> fortlibs CNus>> CNus>> load hello start * CNSF>> CNSF>> CNSF>> Execution begins... HELLO WORLD logoff (Access libraries required to load and run program) (Load the program) (Run the program) Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 236 NATIONAL CENTER FOR ATMOSPHERIC RESEARCH (NCAR) Computer Hardware ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ CRAY Y-MP8/864 with 8 processors; CRAY Y-MP2D with 2 processors 64 Mwords of main memory for the Y-MP8, 16 Mwords for the Y-MP2 48 Mword maximum memory per job for batch; 16 Mwords for interactive 6.0 ns clock for both CRAYs; a measured peak rate of over 1 Gflops has been achieved with a multitasked ocean model Vector processing hardware for both CRAYs 256 million word SSD for Y-MP8 (1000 Mbyte/sec channel), 128 million word SSD for Y-MP2 60 gigabytes of local storage for the Y-MP8, 20 gigabytes of local storage for the Y-MP2 Unix front end NCAR Mass Storage System (MSS) is a hierarchical file storage system with no limit per user. The MSS has a 120 gigabyte disk farm and over 108,000 tape cartridges. It features a StoragTek 4400 Automated Cartridge System capable of holding 6,000 cartridges, or a terabyte of information. Currently, MSS stores over 19 terabytes of data. Extremely high data transfer to the CRAYs; accessible from front-end Connection Machine 2 (8,000 processors and floating point hardware) Sun 4/490 used as a gateway for NCAR's Internet Remote Job Entry System (IRJE). Allows users to create and submit CRAY jobs from their local hosts connected to the Internet. Output is automatically shipped back to the remote host Software ❏ ❏ ❏ UNICOS 6.1.4 operating system on CRAY Y-MP8/864; UNICOS 5.1.11 onCRAY Y-MP2D FORTRAN: CFT 77 version 4.0 (default) or 5.0 Other languages: vectorizing C and Pascal compilers Application Libraries ALFPACK EISPACK FUNPACK FFTPACK ODEPACK SSDLIN NCARG-LOC AMOSLIB EISPKD IMSL MINPACK SPHERE STARPAC NCARM ECMFFT FISHPAK CRAYFISH MUDPACK SCI NCARG NCARO EDA FITPACK LINPACK NAG SLATEC NCARG-GKS Graphics NCAR/GKS Version 3.1.2 Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 237 Training ❏ ❏ ❏ ❏ ❏ ❏ New user orientation class: One-day class to introduce Unix/UNICOS programming tools and the NCAR computing environment. Unix Basics Class: Two-day introduction to the basics of Unix Remote site visits are granted to sites with a significant number of users User conference held every 18 months to update users on new developments and new directions in computing at NCAR Site liaison workshops held biennially: intensive, in-depth presentations on specific aspects of the NCAR computing facility Graphics and optimization workshops are planned for the future Collaborative Research ❏ ❏ ❏ User groups Real-time computing during field programs Classroom grants of computer time Documentation ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ Online documentation available for most of the utilities in the supported libraries via the Distributed Software Libraries (dsl) utility Scientific Computing Division (SCD) hardcopy documentation available free except for the GKS Graphics manual User Documentation Catalog containing references both to SCD supported and vendor documentation. Available online via anonymous FTP to ftp.ucar.edu with the filename /docs/catalog/userdoc.catalog NCAR UNICOS Primer: contains necessary basic information to begin computing at NCAR. Uses step by step examples to create, submit, and receive output from the CRAYs Daily Bulletin: Online source of up to date information on the computing systems Monthly newsletter: SCD Computing News Annual planning report: Supercomputing: The View From NCAR NCAR Annual Report NCAR Annual Scientific Report Consulting ❏ ❏ ❏ ❏ Phone, 8-5 MST weekdays; walk-in consulting available for visitors and local users. Extended consulting available by appointment E-mail consulting available from Internet, BITNET, Span, and Omnet Specialized consulting for software libraries, networking and data communications, optimization, multi-tasking, CRAY I/O optimization, segmentation (overlaying) of large applications, math algorithms, NCAR Graphics, IBM PC/AT and Macintosh, and Unix and UNICOS Visitor assistance includes access 24 hrs/day, 7 days/week, IBM PCs and Macintoshes for terminal or stand-alone use, color graphics terminals, Canon microfilm/fiche reader/printers, community telephone for business use, documentation library (including vendor documentation) Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 238 Graphics Support ❏ ❏ ❏ ❏ ❏ ❏ DICOMED film recorder for 16 mm film and fiche (black and white) DICOMED color film recorder (35 mm color slides) Xerox 4050 laser printers for paper graphical output CGM metafile support Remote graphics support includes: Tektronix 4010, 4105, 4107, 4025, 4115; VT100, VT125, VT220, VT330; ADM; AED512; HP2648a, HP7475a, HP150; PC-Plot for IBM/PC; Versaterm for Macintosh. Output mailed to users at remote sites Strengths and Limitations Strengths ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ High performance vector processing Extensive user support services SSD for large I/O applications Extensive data archives for atmospheric and oceanographic research High volume mass storage system Extremely high volume graphics output capabilities 16 mm movie making and video support Remote job entry system Limitations ❏ ❏ Limited memory Few applications outside atmospheric sciences Administrative ❏ ❏ Allocations are open to university researchers with NSF grants in atmospheric, oceanographic, and related sciences; grant requests are reviewed by a peer review board composed of NCAR staff and university researchers Allocations are also available to government agencies on a cost recovery basis Contact Summaries Consulting: Visitor/User Information: Allocations: Documentation Orders: IBM 4381 front end address: (303) 497-1278 [email protected] (303) 497-1225 [email protected] (303) 497-1207 [email protected] (303) 497-1232 [email protected] evans.ucar.edu (128.117.8.18) Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide IRJE (remote job entry): 239 [email protected] Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 240 NATIONAL CENTER FOR SUPERCOMPUTER APPLICATIONS (NCSA) Computer Hardware ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ CRAY Y-MP4/464 with 4 processors; CRAY-2S/4-128 with 4 processors; Connection Machine Model 2 (CM-2) with 32,000 parallel processors and 32 bit floating point hardware; Convex C240 system (used for memory intensive real-time visualization) 64 Mwords of main memory for the Y-MP; 128 Mwords of main memory for the CRAY-2; 256 MByte main memory for CM-2; 1 Gbyte of physical memory for the Convex A maximum of 6.5 Mwords of main memory per user on the X-MP (see HELP MEMORY on the CRAYs for details) 6.0 ns clock speed for the CRAY Y-MP; 4.1 ns clock speed for the CRAY-2 Vector, scalar, and parallel processing High speed 128 Mword Solid State Disk (SSD) for the CRAY-Y/MP 16 Gbytes temporary storage for Crays; 10 GByte DataVault for the CM-2 Common File System (CFS) with 120 GBytes of permanent file storage running on an Amdahl 5860 Potentially unlimited magnetic tape storage through an IBM 3480 Plans for significant increases in mass storage capabilities Three IBM RISC System 6000 model 550's (high-end superscalar machines for predominantly scalar applications); there will be a total six of 550's and one RS/6000 model 950 Front-end / File Server by the end of 1991. Three Sun 4/490 front ends running SunOS for the CM-2 Numerous high end machines from Silicon Graphics, Apple, IBM, and SUN in the Numerical Laboratory, accessible over the Internet VAX/Ultrix front end for BITNET connectivity New network hardware and software being installed in a testbed research project (BLANCA) to prepare for the national gigabyte transcontinental network (NREN) ; by early 1992 BLANCA should include a 622 Mbit/sec trunk to University of Wisconsin, and 45 Mbit/sec links to Berkeley and Bell labs Software ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ UNICOS is the operating system on both CRAYs. It provides interactive and batch access to a Unix operating system (based on AT&T Unix System V) Multitasking is supported on the CRAYs. Dedicated time is available to allow access to all 4 CPUs Editors: vi on the CRAYs FORTRAN: CFT, CFT77 and CF77; cdbx is the debugger of choice on both CRAYs, though other debuggers are available Other languages: vectorizing C compiler on both CRAYs cfs utility to move files between CFS and the CRAYs and Many example programs for vectorization and graphics on CFS Extensive in-house software development applications staff Public domain software for workstations available via anonymous FTP-connect to ftp.ncsa.uiuc.edu (or 141.142.20.50) with user-id "anonymous" and your user-id and e-mail address as the password-get the file "README.FIRST" for an informative overview of current holdings and FTP instructions. Each directory, including the root, contains a file named "INDEX" which contains a recursive listing of the files of that directory and of all subdirectories within it. Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 241 FTP'able software currently available includes: DataScope, Image, Layout, PalEdit, TELNET, Contours, GelReader, Hypercard Scientific Animation Package, Import2HDF, Reformat/XReformat, SDIFF, PC Show, ImageTool, DataSlice, X Image, PolyView, Isosurface Visualizer, and CompositeToolarchive. Software On the CRAYs Astronomy MIRIAD Chemical Engineering ASPEN PLUS Chemistry AMBER CHAARMm GAUSSIAN90 MM2 MOPAC XPLOR AMPAC DISCO GPRLSA MM2(87) RANFOLD BROOHKAVEN PDb DISCOVER MACROMODEL MOLECULE-SWEDEN RNAFOLD CADPAC GAMESS MINP FLOW3D PLOT3d FLUENT SALE3D KIVA II TURB3D EMAS SIGVIEW HSPICE SPICE MSC/EMAS SUPREM 4 GNUPLOT NCAR (GKS) PVI GRAFMAKER GPLOT PVI Contouring PVI Metafile MOVIE.BYU PVI DI-3000 Zetavu BCS EDA GLIM LAPACK NAG PCGPAK SLAM II SPECFUN XMP BCSEXT EISPACK3 HSML LASO2 NUMERICAL RECIPES PORT SLATEC SPSS-X ZOOM CALMATH ELLPACK IMSL MINOS RPAC Computational Fluid Dynamics FIDAP PHOENICS Electrical Engineering CAzM PISCES IIB Graphics Blaze MPGS PVI GK-2000 Mathematics and Statistics ACM-Algorithms ECMFFT FFT ITPACK MINPACK ODEPACK SCILIB SPARSE TOEPLITZ POSSOL SMPAK SSDLIN Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 242 Solid Mechanics and General Engineering ABAQUS DYNA3D NIKE2D TAURUS ANSYS INGRID NIKE3D TOPAZ2D DADS MAZE ORION TOPAZ3D DYNA2D MSC/NASTRAN PATRAN II BENCHLIB CFT77 PCC CDBX HDF SCC CF77 KAP/Cray Systems and Utilities AS CFT PASCAL Training ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ Education program features supercomputer use for users from kindergarten to advanced researchers; a strong emphasis also on incorporating scientific visualization techniques into education. Academic Affiliates Program with members at more than 100 institutions; features special training and block grants of computer time for members. Visitors program for faculty, postdoctoral, and student researchers to support working visits to NCSA. Renaissance Experimental Laboratory for teaching visualization skills and efforts to incorporate scientific visualization into course curricula. Monthly training workshops on introductory and advanced topics including use of the Crays, the Connection Machine, applications packages, and visualization techniques. Off-site classes available covering topics of interest to particular remote sites. Workshops and seminars on specialized topics in various disciplines. Summer institutes and workshops. Many training video tapes: vectorization, CRAY architecture, Multi-tasking, etc. Collaborative Research ❏ ❏ Association with the Beckman Institute, an interdisciplinary program for artists, computer scientists, and researchers in many intellectual disciplines. Unix mail on the CRAYs (users are encouraged to forward mail to their home systems). Documentation ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ Unix man pages for technical information Documentation system (originally from CTSS) ported to UNICOS for access to complete manuals On-line HELP facilities on CRAYs NCSA Technical Resources Catalog lists documentation available from NCSA or third parties Innovative video magazine (NCSA RealTime) New users provided with an extensive startup kit and kept informed via frequent online and printed materials. Many documents are available for free or for purchase Online help is available for both the CRAY and the VAXes Extensive sets of example programs are available on CFS Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide ❏ ❏ 243 Bimonthly newsletters: ACCESS and DATALINK Annual report, entitled "SCIENCE: The State of Knowing," which summarizes NCSA's activities in the previous year Consulting ❏ ❏ Consulting available via e-mail (24 hours a day) and phone (8am to 5pm central time (see Contact Summaries below) On-line HELP and man pages on the CRAYs, help files on the VAXes Graphics Support ❏ ❏ ❏ ❏ ❏ ❏ ❏ Strong emphasis on local and remote use of scientific visualization Workstation tools for graphics analysis Scientific visualization programs, to which users may apply to have their data produced for use in high quality graphics presentations CGM metafile support Support for remote graphics terminals includes Tektronix 4014, 4105, 4113, 4115/4125, PostScript, HPGL, Macintosh Output is mailed to remote users Media Services facility features video and audio resources, including Silicon Graphics Inc. frame buffers, Abekas digital disk recorders, D1 format digital VCRs, Macintosh-based digital audio recording, Betacam SP format analog VCRs, computer-controlled editing and routing, and over 150 other components. Activities supported include transfer of images from computers to video, audio, hard copy, and film, as well as between the different formats within each of these media; media processing such as video editing, text generation, electronic paintbox, digital effects, and compositing; audio recording and editing to further supplement basic imagery; and video field production for documentary programming and special projects. Strengths Strengths: ❏ ❏ ❏ ❏ High performance vector processing Solid State Disk for fast internal I/O Scientific visualization State-of-the-art graphics laboratories Administrative ❏ ❏ ❏ ❏ Requests for 100 or more service units of CPU time are reviewed by a joint NCSA/Pittsburgh Peer Review Board quarterly. Requests for less than 100 service units are made eight times a year. Applications for less than six service units are reviewed internally by NCSA. Researchers at affiliate institutions may apply for start-up grants for 1-5 hours on the CRAY Y/MP4/464 through their campus affiliate representatives. Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide ❏ 244 The Supercomputing Education Project allocates blocks of five service units on the CRAY Y/MP4/464 for faculty who use high-performance computing in their classes. (note: service units are CPU or wall clock hours weighted by different factors for the various computers) Contact Summaries Academic Affiliates: Academic & Industrial Relations Program: Accounts / Client Administration: Consulting: Education Program: Joe Blackmon (217) 244-1100 [email protected] Scott Lathrop (217) 244-1099 [email protected] u13006@ncsagate (BITNET) Judy Olson (217) 244-0074 [email protected] uadmin@ncsagate (BITNET) (217) 244-1144 [email protected] consult@ncsagate (BITNET) Nora Sabelli (217) 244-0644 [email protected] nsabelli@ncsagate (BITNET) Faculty Program: Melanie Loots (217) 244-2921 mloots@ncsa,uiuc.edu u26400@ncsagate Media Services: Orders for software, publications, videos: Training: (BITNET) Vincent Jurgens (217) 244-1543 [email protected] u14998@ncsagate (BITNET) Debbie Shirley (217) 244-4130 [email protected] docorder@ncsagate (BITNET) Lyle Rigdon (information) (217) 244-3659 [email protected] Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 245 Karen Gobble (registration) (217) 244-4198 [email protected] Hardware Status: (217) 244-0710 Network status: (617) 873-3400 Cray Operations: (217) 244-0710 CRAY Y-MP address: CRAY-2 address: CM Sun Front-Ends: VAX/Ultrix gateway Dial-up Access Anonymous FTP: uy.ncsa.uiuc.edu (141.142.101.1) u2.ncsa.uiuc.edu (141.142.102.2) cmsun1.ncsa.uiuc.edu (141.142.220.4) cmsun2.ncsa.uiuc.edu (141.142.220.7) cmsun3.ncsa.uiuc.edu (141.142.220.8) ncsagate.ncsa.uiuc.edu (141.142.121.38) ncsagate (BITNET) (217) 244-0664 (2400 Baud or less) (217) 244-0662 (9600 Baud or less) ftp.ncsa.uiuc.edu (141.142.20.50) Login Script The following script shows how to TELNET to the NCSA CRAY, list files, compile and run a job, and logout. The script assumes that you connect to the CRAY from a local machine which supports the TCP/IP program TELNET. Prompts are represented by "user>>" for you, "CRAY>>" for the CRAY, "TELN>>" for TELNET, and "CRus>>" for CRAY responses followed by user entries on the same line. Most CRAY responses are abbreviated. Comments are preceded by parentheses. Prompt Dialog Comments user>> telnet u2.ncsa.uiuc.edu (TELNET to the CRAY-2) TELN>> CRAY>> CRAY>> ... CRAY-2 UNICOS 5.0.7 (u2) National Center for Supercomputing Applications (TELNET messages) CRus>> CRus>> CRus>> CRAY>> CRus>> CRAY>> login: your-CRAY-login Password:your-password account:your-account (login to the CRAY) CRus>> u2 1% ls -la . .. .login .profile u2 2% cft77 hello.f CRus>> u2 3% segldr -o hello hello.o (CRAY login messages) (ask to list your files) .cshrc hello.f (compile program called "hello.f", generate a binary object file called "hello.o") (load the object file and create an executable Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide CRus>> CRus>> u2 4% hello u2 5% cat fort.6 CRAY>> CRus>> Hello world, goodbye world u2 6% logout 246 file called "hello") (submit executable file) (display contents of output file) (logoff CRAY and return to local machine) Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 247 NATIONAL ENERGY RESEARCH SUPERCOMPUTER CENTER (NERSC) Computer Hardware ❏ ❏ ❏ ❏ ❏ ❏ One CRAY 2/8, two CRAY 2/4s, and an XMP 1/8 for High School Supercomputer Honors Program (one of the CRAY 2/4s will be removed sometime in early 1992). Memory sizes are 128 Mwords on the CRAY 2's Vector and parallel hardware; 2 processors on the CRAY X-MP/24, 8 processors on one of the CRAY 2s, and 4 processors on each of the CRAY-2s Permanent storage is implemented on the IBM-based CFS storage system 1500 Gbytes total mass storage Auxiliary computers include VAXs and other network computers Software ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ UNICOS 6.1 on the CRAY 2/8 and the CRAY XMP 1/8; The CRAY 2/4 using CRAY Time Sharing System (CTSS) will be discontinued early 1992; the other CRAY 2/4 is physically located in Colorado Springs, and runs CSOS (Colorado Springs Operating System, a derivative of UNICOS 5.1 developed by the Cray Computer Corporation). Auxiliary VAXs use VMS operating system Editors on the CRAYs include vi, EMACS, and standard Unix editors FORTRAN compilers: CF77 on UNICOS and F77 on CSOS Other languages: C, Pascal, and LISP compilers, and CRAY Assembler CFS is the software used for mass storage Example sets, sample programs, and extensive documentation can be viewed online through the DOCVIEW program Disks with the NERSC CTSSLINK software for IBM PCs and PC-compatibles are available free to users Many Unix utilities are available in the CTSS and UNICOS environments Math IMSL NAG SCILIB GKS GRAFLIB Graphics DISSPLA TV80LIB NCARGKS Training ❏ ❏ ❏ ❏ ❏ New user workshops are available both on site and for export Monthly on-site UNICOS classes Classes are offered on supercomputer related topics Work in progress to develop an online tutorial service A high school Supercomputing Honors Program is offered each summer Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 248 Collaborative Research ❏ ❏ ❏ E-mail is performed with MAIL and MAILX Bulletin Board Server and a Mail Server machine being developed MFENET/ESNET networks supported by this center provide for remote logins, e-mail, and file transfers to and from nodes on these networks and on the Internet Documentation ❏ ❏ ❏ Monthly newsletter, "The BUFFER" News is supplied by a site-supported bulletin board called "news" A VMS-like HELP is available Consulting ❏ ❏ Phone consulting Mondays through Fridays, 8:00--11:45 a.m., 12:45-4:45 p.m. Online e-mail consulting via mail to [email protected] Graphics Support ❏ ❏ ❏ ❏ A DICOMED camera is available to remote users for film, slides, and fiche Remote graphics terminals supported include most Tektronix displays and IBM PCs and compatibles Output is mailed free of charge to users at remote sites Facilities for PostScript output are being explored Strengths ❏ ❏ ❏ Highly optimized vector processing Large memory machines A network connecting energy research sites provides for collaboration and exchange of information between researchers Administrative ❏ Most allocations are made by applying to the Department of Energy (DOE) Contact Summaries Consulting: Accounts:(passwords and ID's): Allocations: Training: (510) 422-1544 (800) 66NERSC (510) 422-2888 (510) 422-1544 (510) 422-1544 Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide Hardware status: Network status: Direct CRAY connection: 249 (510) 422-4283 (510) 422-4283 f.nersc.gov (128.55.64.120) Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 250 Login Script The following script shows how to TELNET to the NERSC CRAYs, login, transfer files from a local account to the CRAY using FTP (NERSC currently has a limited number of FTP functions installed), list files, compile/load/execute a program, and then logout. It assumes that you connect to the CRAY from some local machine which supports the TCP/IP TELNET program. Prompts are represented by "user>>" for you, "TELN>>" for TELNET, "CRAY>>" for the CRAY, and "CRus>>" for CRAY responses followed by user entries on the same line. Comments are preceded by parentheses. Most CRAY responses are abbreviated using the "..." ellipsis notation. This script has been tested from the University of Washington: Prompt Dialog Comments user>> TELN>> CRus>> CRus>> CRAY>> user>> CRus>> telnet f.nersc.gov ... ID: usernumber Password: password ... ftp FTP> connect 128.95.137.4 CRAY>> ... (TELNET to the CRAY) (TELNET messages) (enter CRAY usernumber) (enter CRAY password) (CRAY login messages) (start FTP) (make connection with FTP to your local account) (FTP messages) CRus>> MAX.U.WASHINGTON.EDU> login user-id ctrl-z password (note that the user-id and password must be entered on the same line, the ctrl-z is required to mask the password) CRus>> MAX.U.WASHINGTON.EDU> get hello.for hello.f (now get your program with FTP your local account and send to the CRAY) CRAY>> ... file transfer messages from FTP CRus>> MAX.U.WASHINGTON.EDU> quit CRAY>> user>> CRAY>> ... ls hello.f (quit FTP and return to CRAY session) (more FTP messages) (ask to list your files) user>> CF77 hello (compile and load your FORTRAN program) user>> ctrl-d (control-d logs you off the CRAY) Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 251 PITTSBURGH SUPERCOMPUTING CENTER (PSC) Hardware Cray Y-MP/832 with 8 processors, 32 million words of memory, and a high speed (156 Mword/second) 128 million word Solid-State Storage Device (SSD) ❏ ❏ ❏ ❏ ❏ ❏ A maximum of 25 Mwords per user 6.0 ns clock; maximum speed 2.6 gigaflops High performance parallel and vector hardware Very large temporary storage per user Unlimited permanent storage in IBM based Common File System using hierarchical directories Users can request dedicated time. Connection Machine CM-2 with 32,768 processors, 1 gigabyte of memory, and 10 gigabytes of high speed storage on the DataVault. The processors work in parallel. Each processor has 32 Kbytes of memory associated with it, for a total of 1 gigabyte for the machine. ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ Users may use 8K, 16K, or 32K processors at once 1,024 64-bit floating point accelerator chips Maximum speed in the gigaflop range Temporary space and permanent storage space available on the Andrew File System (afs) through the CM-2's front-ends (see later for more information on afs) Driven by three front-ends: CMVAX, a VAX running Ultrix, and two SUN 4-470s running Unix, SUNA and SUNB. CM applications are executed on the front-ends. Those parts of the application which benefit from parallel processing are executed on the CM-2, while those which are serial remain on the front-end and are processed there. Users can request dedicated time. Three front-ends which drive the CM-2 (see section on CM-2 above) Two Vax 6420s (CPWSCA and CPWSCB) running VMS from which you can reach either the Y-MP or the CM-2's front ends. Users have 10,000 blocks of permanent storage and a large amount of temporary storage. Two Vaxstation 5100s (PSCUXA and PSCUXB) running Ultrix from which you can reach either the Y-MP or the CM-2's front-ends. These front-ends use afs as their file system. Users have 10,000 1024-byte blocks of permanent storage on afs and a limited amount of temporary space. Software: Y-MP ❏ ❏ ❏ ❏ ❏ ❏ ❏ UNICOS Editors include EMACS, vi, ed and LSEDIT (Language sensitive editor for CFT77) FORTRAN: CFT77, and FORGE (an aid to vectorization) CF77 compiling system includes CFT77, automatic optimization and autotasking, and loader. Other languages: C (with vectorization support), Pascal Mass storage: Common File System (CFS) with automatic tape storage and retrieval A large examples system, containing sample jobs, data and the resulting output are publicly available . Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 252 ❏ Downloadable public domain software ❏ ❏ ❏ ❏ ❏ Front-ends run either Ultrix or Unix. Editors on front-ends include EMACS, vi and ed Languages: FORTRAN (cmf), C and Lisp Mass storage: AFS (see below) Examples system containing sample jobs, data and the resulting output are publicly available CM-2 Biology ALIGN CONSORT GENBANK MDPP PICKEMBL SEQA SEQ_FILE BROOKHAVEN ECD IB_TO_GB MSA PICKGEN SEQH SEQUIN CLUSTER EMBL MAKSEQ MSC PROFILE SEQHP XPLOR CONSENSUS ENZYME GCG MAXSEGS NWGAP REBASE XRFORM AMPAC CHELP GPRLSA NBRF RANFOLD ST AMPS DISTAN GROMOS POLYRATE RNAFOLD SWEDEN CADPAC40 GAMESS90 MOPAC PROSITE SN SWISS FLOW3D STEAM Chemistry AMBER CHARMM GAUSSIAN MULFOLD PROTIN SP Computational Fluid Dynamics FIDAP Electrical SPICE SPLICE Engineering KIVA FORTRAN Utilities BENCHM FORTOOLS RECIPES CHRPAK FSPLIT TOKENS CLEAN77 FTREF TOOLPACK FORCHEK LOOPMARK V77 Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 253 Graphics ANIMATOR DRAW GPLOT IMAGETOOL MOVIE6 NCARGKS2 PDBMODEL REQUESTAPE SLIDEMAKING TEXTMAKER CODEBOOK DRAWCGM GPLOTM LVR MOVIETOP3D NCARGKS3 PLT2 RLECAT SMDLIB TIFFTORLE DI3000 DRAWP3D GRAPHX MACGPLOT NAVIEW ORION PNMTOCGM RLETOCGM SMONGO TITLEMAKER DISSPLA11 EDA GTEX MARCHP3D NCARDSL PAL2RGB POLYP3D SGML TAURUS AMOS BAILEY BDMG BORMAT CGLIB CYCLE DVERK EISPACK ELLPACK FITPACK GBSOL HSSXEV INTLIB LAPACK LINPACK LSOLVE MATHLIB MP NL2SOL PCHIP PLTMG RANPACK SCILIB SPARBLAS SPECFUN SYMPAK TESTNON VCFT YSMP AMOSLIB BANDIT BIHAR BSMP CMLIB DASSL DYNA2D EISPACKC FFTPACK FN GQOPT IMSLDOC ITPACK2C LASO LINWOOD LSQR MATMUL MUDPACK NMS PDECOL POLPAK RECIPESC SGEFAC SPARSE SPLPAK TESTLP TOEPLITZ VE1 ZERO APML BCSLIB BIVAR BVPSOL COLNEW DIERCKX DYNA3D ELEFUNT FFTPACK FUNPACK HARWELL IMSL11 ITPACKV2D LBENCH LLSQ LUSP MFFT NAG ODE PDEONE QFEPDE REDUCE SLAP SPARSKIT SSDLIN TESTMAT TOMS VFFTPK ANSYS NIKE2D TOPAZ3D BOPACE NIKE3D FACET SAP4 Mathematics ALFPACK AUTO BCSLIBEXT BLAS CALMATH COMPAR DRIV EFUN ELLPACK FISHPAK32 GAMS HBSMC INGRID JAKEF LBENCHC LOPSI MAPLE MINPACK NAPACK ODEPACK PITCON QUADPACK RKF45 SLATEC31 SPARSPAK SUBSET TESTNLS UNCMIN Y12M Mechanics ABAQUS MAZE TOPAZ2D Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 254 Programming Languages ALISP FORTRAN C GCC C++ LISP CAL PASCAL ODRPACK TLS ODRPACKX STARPAC Simulation CASCADE Statistics APSTAT STATLIB Utilities--Benchmarks/Debugging/Optimization/Tracing/Vectorization BOUNDS DHRYSTONEC HPM NASKER PROCSTAT SLALOM CDBX EXPORTS LIVERMORE PARANOIA PROF TESTUCON CM_TIMER FLOWTRACE MACHAR PERFECT PSR TESTVECTOR DEBUG FORGE MACHINE PERFTRACE SCOUNT WHETSTONE D2S PAD TAR2VMS DETAB SGREP UUENCODE CMNQS NQS DEDCPU PSCSUB DHSC YJANUS CDECL SPR CONDENSE Utilities--File Conversion / Processing COMPRESS ETAPE STRIPPER VMS2TAR CONVERT LINES TAIL XTRACT Utilities--File Systems AFS CFS Utilities--Job handling, Accounting BENCHLIB HELPER YSUB Utilities--Miscellaneous BISON SETUP CSORT Andrew File System: The Andrew File System (afs) is a distributed network file system used on PSC front-ends PSCUXA, PSCUXB, CMVAX, SUNA, and SUNB. PSC plans to make afs available on all of its machines. Users therefore maintain one set of files, accessible from all machines. It is not necessary to keep multiple copies of files or to transfer files Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 255 back and forth between the various front-ends. Automatic daily backups are done. PSC maintains documentation, examples, libraries, executables and source code on afs in a single location which is accessible from all machines. Each user has a quota of 10,000 1024-byte blocks of permanent storage. A limited amount of temporary storage is also available. The Biomedical Initiative: PSC received a grant from the National Institutes of Health's (NIH) Division of Research Resources' Biomedical Research Technology program to provide the biomedical community with supercomputing resources, training, and user support. Two biomedical specialists, with large-scale computational backgrounds, are available to support the supercomputing activities. Distributed High Speed Computing: The Distributed High Speed Computing (DHSC) project at PSC aims to provide an easy to use interface to the HiPPI (High Performance Parallel Interface) link between the Center's Cray YMP/832 and 32K processor Connection Machine. This HiPPI network link between the Cray and the CM is capable of transmitting data at rates of up to 100 MBytes/Sec. Through the use of Distributed High Speed Computing, users are able to partition applications between the Cray and the CM, thus choosing the most appropriate type of supercomputer to solve different portions of the application. Because of the vastly different kinds of problems which can be solved on the Cray and the Connection Machine, some applications will see significant speedups in overall execution time via this approach. The DHSC project is embodied in a set of library routines, callable from CFT77 and Standard C on the Cray, and CMFortran, C*, and C-Paris on the Connection Machine. These library calls provide a simple interface to transfer data between programs running in parallel on the two machines. Control issues (such as synchronization of flow) and data conversion issues (such as parallel to serial and IEEE to Cray floating point conversions) are handled internally by the libraries, freeing the user from these low level concerns. Training: New User Workshops ❏ ❏ ❏ Cray Techniques workshop (5 days) Connection Machine Techniques workshop (5 days) Summer Institute (2 weeks) Advanced-User Workshops ❏ ❏ ❏ ❏ Code Optimization (one day) Multitasking (one day) Visualization (one day) Optimization of FORTRAN Code for Parallel Shared-Memory Systems (4 days) Discipline-Specific Workshops ❏ ❏ Introduction to Gaussian: Theory and Practice (5 days) National Institutes of Health Workshops Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 256 Through grants from the National Institutes of Health, the PSC offers a series of workshops dedicated to the biomedical research community, including an overview of biomedical software and databases available at PSC. Topics presented have included molecular mechanics and dynamics, macromolecular structure refinement, nucleic acid and protein sequence analysis, fluid dynamics with immersed flexible structures, and image reconstruction from Electron Microscopy. Topic-specific workshops are provided on an "as-needed" basis and new workshops are under continual development. Documentation: ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ Many vendor and hundreds of PSC publications online, including policy, allocations and user guides CRAY manuals mailed via UPS List of documents is available online Hot tips and news appear in BULLETIN, and rn. BULLETIN and rn are bulletin board systems on the VMS front-ends and the Ultrix front-ends, respectively. Notices are also posted on 'news' on the Y-MP. Online help includes man pages on every PSC system. PSC Users Guide mailed to all users. Online EXAMPLES system contains complete job setups. An annual report "Projects in Scientific Computing" highlights the scientific projects completed at PSC Consulting: ❏ ❏ ❏ ❏ ❏ Phone consulting available M-F 9 a.m. to 8 p.m., Saturday 9 a.m. to 4 p.m. (Eastern time) E-mail consulting via user-id REMARKS Online man pages Discipline-specific consulting "life-cycle" consulting: starting with algorithm selection through data layout, programming, and program optimization for CM users. Graphics Support: ❏ ❏ ❏ ❏ ❏ ❏ ❏ CGM metafile support CGM-based video animation system for VHS tape and videodisk Support for remote graphics terminals includes many devices; also PSC is willing to acquire or develop drivers for nearly any modern device on request. VHS tape output mailed to remote users On-site graphics labs with Silicon Graphics IRIS, SUN Sparcstation, IBM RS6000, and DECStation 5000. Capability to make 35mm color slides using Matrix Instruments SlideWriter Color output from Cannon CLC-500 color copier/printer Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 257 Administrative: ❏ ❏ Small allocations (10 hours or less) are reviewed quickly by PSC staff. Larger allocations (over 100 hours) are reviewed by the joint PSC/NCSA Peer Review Board. Intermediate size allocations (1199 units) are reviewed internally subject to confirmation by outside reviews via U.S. Postal mail. Starter grants are available for any researcher who wishes to explore the use of the PSC. Contact summaries: Consulting Accounts Allocations Training Hardware status Network status Front-end Internet addresses CM-2 front-end Internet addresses Cray Internet address (412) 286-4960 (412) 286-4960 Allocations Coordinator (412) 286-4960 or [email protected] (412) 286-4960 (412) 286-4960 (412) 286-4960 a.psc.edu (VMS) b.psc.edu (VMS) pscuxa.psc.edu (Ultrix) pscuxb.psc.edu (Ultrix) cmvax.psc.edu (Ultrix) suna.psc.edu (Ultrix) sunb.psc.edu (Ultrix) pscymp.psc.edu Login Script The following script shows how to connect to the font end VMS VAX, login, create and a job which submits 'hello.f' to the CRAY, and then logout. It assumes that you connect to the front end from some local machine which supports the TCP/IP TELNET program. Prompts are represented by "user>>" for you, "PSC>" for the frontend, "TELN>>" for TELNET, and "PSCus>>" for frontend responses followed by user entries on the same line. Most responses are abbreviated. Comments are preceded by parentheses. Prompt user>> TELN>> PSCus>> PSCus>> PSC>> user>> Dialog TELNET a.psc.edu ... Username: user-id Password: password ... emacs hello.job #USER=user-id PW=password #QSUB -lM 0.8 Mw #QSUB -lT 5 ja date set -x cd $TMP Comments (TELNET to the front end) (TELNET messages) (PSC login messages) (create the following job (to submitted to the CRAY) (CRAY from the VAX later with the csubmit command) Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 258 fetch hello.f -t 'usr$root0:[user-id]hello.f cf77 hello.f limsl11 mv a.out hello.exe hello.exe > results cfs -r5 store results rm hello.exe hello.f date ja -st user>> PSC>> user>> PSC>> PSC>> PSC>> PSC>> PSC>> PSC>> PSC>> user>> cray The Cray Station is available csubmit hello.job %CX-S-SUB_OK, Job: Hello queued for submission VAX TO CRAY:%SYSTEM-S-NORMAL, normal successful completion VAX TO CRAY: FILE=HELLO VAX TO CRAY: 1215 BYTES TRANSFERRED CRAY TO VAX: %RMS-S-NORMAL, normal successful completion CRAY TO VAX: FILE=$1$DUA102:[USR2.USERID]HELLO.OUT;1 CRAY TO VAX: 34 BYTES TRANSFERRED logout Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 259 SAN DIEGO SUPERCOMPUTER CENTER (SDSC) Computer Hardware ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ CRAY Y-MP8/864 running UNICOS Up to 32 Mwords main memory per user 6 ns clock; a maximum of 2.7 Gflops for the entire system; up to 337 maximum Mflops per CPU Vector processing hardware 65 Gbytes online temporary storage 128 MWord SSD Intel iPSC/860, 64 nodes 8 MBytes of memory per node totaling 512 MBytes Peak speed of 2.6 Gflops (for 32-bit arithmetic) nCUBE 2, 128 nodes 64 nodes with 16 MByes of memory each 64 nodes with 4 Mbytes of memory each Total memory 1.3 Gbytes Peak speed of 420 Mflops (for 32-bit arithmetic) DataTree for file storage on an Amdahl 5860 Software ❏ ❏ ❏ ❏ ❏ UNICOS on the CRAY Y-MP Editor: vi, emacs, and standard Unix line editors on the CRAY Y/MP FORTRAN: CFT77 vectorizing compiler Other languages: Pascal (vectorizing), CC (ANSI C vectorizing compiler), CRAY C, AS (CRAY Assembly language) Extensive example programs are available. Biology DRAW RANFOLD FASTA RNAFOLD GenBank DB SN PIR DB AMPAC CHARM DISCOVER GAUSSIAN 88 MMTOOLS POLYRATE VENUS BIGSTRN-3 CHELP DMOL GAUSSIAN 90 MMX PROLSQ X-PLOR CADPAC CORMA ECEPP2 GROMOS MOPAC PSI77 NETSCAT PRECISE SPICE Chemistry AMBER CAMBGIDGE DB DGEOM GAMESS MM2 MPLOT QCFF/PI Electrical HSPICE Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide SUPREM 260 UMSPICE Mechanics ABAQUS CSQ FIDAP FLUENT/BFC MOLDFLOW NIKE3D TOPAZ2D ADINA DYNA2D FLOTRAN INGRID MPGS ORION TOPAZ3D ANSYS DYNA3D FLOW-3D INS3D MSC/NASTRAN STARDYNE CONTINUSYS FACET FLUENT MAZE NIKE2D TAURUS BCS HARWELL IMSLSTAT LIBSCI MUDPACK ODEPACK SLATEC TOEPLITZ BCS-EXT HOMPACK ITPACKV MATLAB NAG OMNI SMPAK TOMS DASSL IMSLMATH LAPACK MINOS NREG77 PLTMG SPARSPAK VECTFFT ELLPACK IMSLSFUN LASO MINPACK NSPCG SLAP SPSS-X GKSNCAR MOVIE.BYU XDATASLICE GKSUL NCARGRAPHICS XIMAGE GNUPLOT PLOTXY DOS REBUS ENDF DB SABRINA MCNP TRANSX Math Graphics DISSPLA HDF VOGLE Nuclear Engineering DIF3D NJOY TWOHEX Training ❏ ❏ ❏ Two-day workshops for new users are held at the beginning of each quarter and at remote sites when requested. Advanced workshops are available on specialized topics, such as vectorization and visualization, both on-site and for export. Summer Institute for those with developed code: the applications are reviewed by an SDSC committee and are open to faculty, graduate students, undergraduates, and industry. Collaborative Research ❏ ❏ Visiting scientists program Research Fellows program for undergrads, postdoctoral, and senior staff Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 261 Documentation ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ Over 150 complete user documents are available online for viewing and/or printing. Over 3,000 man pages are online including over 300 locally developed. Hot tips and news is available in NEWS. The bi-monthly newsletter is called "Gather/Scatter." Users Guide is given to all users. Extensive examples and instructions on their use is available online. Annual report titled "Science at the San Diego Supercomputer Center 19xx" An overview brochure that includes an application for computing resources Consulting ❏ ❏ ❏ Phone consulting is available 8am-5pm Monday-Friday Pacific time. Online consulting is through MAIL [email protected] Discipline-specific consulting is available in most applications. Graphics Support ❏ ❏ ❏ ❏ ❏ ❏ ❏ ❏ A Management Graphics Solitaire-8 digital film recorder Matrix 6264 analog film recorder Lasergraphics LFR Macintosh film recorder Hewlett Packard Paintwriter color Macintosh printer Complete audio and video post-production facility for animations Complete set of image manipulation and conversion software Rendering software including Alias, Wavefront, and Renderman Output mailed to your site Strengths ❏ ❏ ❏ ❏ ❏ MIMD parallel computing Networking--infrastructure and research Visualization Large collection of applications and math software High performance vectorization Administrative ❏ ❏ Allocations for large blocks of time are reviewed by an allocation committee and must be submitted 60 days prior to each quarter Small allocations (1-20 hours) may be submitted any time Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 262 Contact Summaries Consulting: Accounts: Allocations: Training: Hardware status: Network status: CRAY Internet address: (619) 534-5100 [email protected] (619) 534-5100 Dr. Rozeanne Steckler (619) 534-5120 [email protected] Ms. Jayne Waggoner (619) 534-5124 [email protected] (619) 534-5100 (619) 534-5100 y1.sdsc.edu (132.249.10.1) Login Script The following script shows how to TELNET to the San Diego CRAY, login, list files, compile and execute a simple FORTRAN program, and then logout. It assumes that you connect to the CRAY from some local machine which supports the TCP/IP TELNET program. Prompts are represented by "user>>" for you, "TELN>>" for TELNET, "CRAY>>" for the CRAY, and "CRus>>" for CRAY responses followed by user entries on the same line. Comments are preceded by parentheses. Most CRAY responses are abbreviated using the "..." ellipsis notation. Note that the system prompts on the SDSC CRAY Y/MP currently have the form "y1-n%" where "n" is the line number Prompt user>> TELN>> CRus>> CRus>> CRAY>> CRus>> Dialog telnet y1.sdsc.edu ... login: your-CRAY-login Password: your-password ... y1-1% ls hello.f Comments (TELNET to the CRAY) (TELNET messages) (login to the CRAY) CRus>> y1-2% cf77 -o hello hello.f CRus>> CRus>> y1-3% hello y1-4% logout (compile "hello.f" code and generate executable file called "hello" (execute "hello" program) (logoff CRAY, return to your local machine) (CRAY login messages) (ask to list your files) Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 263 Chapter 17: Supercomputer Site Descriptions NorthWestNet User Services Internet Resource Guide 264 Trademarks and Copyrights Apollo is a trademark of Apollo Computer, Inc. Apple is a trademark of Apple Computer, Inc. BRS/Search is a copyright of BRS Software Products ConneXions and Interop are trademarks of the Advanced Computing Environments. CP/M is a trademark of Digital Research, Inc. Cray X-MP, Cray Y-MP, and Cray 2 are trademarks of Cray Research, Inc. DEC, DECNET, TOP-20, Ultrix, VAX, and VMS are registered trademarks of the Digital Equipment Corporation. DYNIX is a trademark of Sequent Computer Systems Inc. Dow Jones News/Retrieval is a registered trademark of Dow Jones and Company, Inc. Fido and FidoNet are trademarks of Tom Jennings. Geographic Nameserver is a copyright of Merit, Inc. IBM, IBM PC, PC/XT. PC/AT and OS/2 are registered trademarks of International Business Machines Corporation. IEEE is a trademark of the Institute of Electrical and Electronics Engineers, Inc. Knowbot is a trademark of the Corporation for National Research Initiatives Macintosh is a trademark licensed to Apple Computer, Inc. Microsoft and MS-DOS are trademarks of Microsoft Corporation. PostScript is a trademark of Adobe Systems Inc. QUIPU is a trademark of NYSERNet, Inc. SAS is a trademark of SAS Institute, Inc. Telenet and Tele-mail are trademarks of Telenet Communications Corporation. Unix is a registered trademark of AT&T Bell Laboratories. Word Perfect is a trademark of the Word Perfect Corporation. Xerox is a registered trademark of Xerox Corporation. Trademarks and Copyrights NorthWestNet User Services Internet Resource Guide 265 Trademarks and Copyrights How Did We Do? We are eager to know what you thought about NUSIRG so we can improve the next edition. You can use FTP to get an electronic copy of this form from the NorthWestNet Network Information Center: FTP Host: directory: file: ftphost.nwnet.net nic/nwnet/users-guide feedback.doc Send your "marked-up" file via electronic mail to: [email protected] Or if you have a printed copy of this document, you can fill it out and send it by postal mail to: NorthWestNet 15400 SE 30th Place, Suite 202 Bellevue, WA 98007 NUSIRG Evaluation Form ______ Overall Evaluation (10 = excellent, 1 = poor) ______ Effectiveness (10 = excellent, 1 = poor) ______ Usefulness of examples (10 = excellent, 1 = poor) ______ Problems with examples (10 = none, 1 = many) ______ Order of presentation (10 = excellent, 1 = poor) ______ Comprehensiveness (10 = excellent, 1 = poor) ______ Ease of finding information (10 = very easy, 1 = difficult) ______ Usefulness of references (10 = very useful, 1 = not very useful, 0 = never looked them up) ______ Level of presentation (10 = too complex, 5 = just right, 1 = too simple) Trademarks and Copyrights If you have other comments and suggestions which you'd like to make, here's your chance! Comments on Your Overall Impression of NUSIRG: Comments on NUSIRG's Effectiveness: Comments on NUSRIG's Examples: All examples in NUSIRG have been previously tested. However, there are inevitably unanticipated problems at remote sites, so please let us know about any problems you experienced so modifications can be made to avoid recurrence. Examples which gave you problems: What happened? What kind of computer hardware were you using? (computer, modem, etc.) What kind of computer software? (terminal emulation program, etc.) Other Comments? Trademarks and Copyrights Comments on NUSIRG's Level and Style Other Examples and Resources for Future NUSIRG Editions: We're constantly on the "look-out" for additional resources to include in NUSIRG. If you have suggestions, please send pointers or descriptive text to [email protected] or hardcopy via U.S. Post to NorthWestNet at the address listed on the first page of this form. Trademarks and Copyrights Optional Contact Information: Your Name __________________________________________ Position and/or Title __________________________________________ User-id __________________________________________ Preferred Internet Address __________________________________________ Background Information To make the most use of the comments of yourself and others, we'd like some background information about each respondent so we know how to categorize your responses. 1. Please mark the one personal identifier which best describes you. ___ K-12 student ___ K-12 teacher ___ university student ___ university professor ___ librarian ___ researcher / scholar ___ user services staff member ___ technical support staff member ___ computer manager ___ computer network manager ___ other 2. Years of experience using computers: _____ 3. Years of experience using computer networks: _____ Thanks for your input. We'll make every effort to act on your suggestions! INDEX @ A @, defined, 8, 23-24 ACM (Association for Computing Machinery), 15 addresses Internet networks, see Internet, addresses Trademarks and Copyrights non-Internet networks, see electronic mail gateways Advantage Foundation, 100 USENET discussion groups about, 52 BinHex, 51 Biology Aeronautical Navigation databases, online, 124 supercomputer software, 252, 259 BITNET, 13 Agriculture and LISTSERV, see LISTSERV databases, online, 26, 125 Almanac electronic mail server, 26, 99, 182-83 sending electronic mail to, 36 BLANCA, 240 AlterNet contact information, 201 Amdahl's Law and optimizing compilers, 226 Andrew File System, 254 Annenberg Foundation, 181 ANS contact information, 201 Applelink sending electronic mail to, 36 ARC, 51 archie, 65-69 accessing by e-mail, 66 sample TELNET session, 67-68 syntax, 66 archived files, 49 archives, see FTP, file archives Area Studies databases, online, 123, 125, 126 ARPANET, 7, 10 Artificial Intelligence C cache memory and supercomputers, 219 career development databases, online, 125 Census databases, online (Canada), 122 databases, online (U.S.), 131 CERFnet, 11 contact information, 198 Chatback, 175 Chemical Engineering supercomputer software, 241 Chemistry archives of software, 131 supercomputer software, 241, 252, 259 CICnet, 11 contact information, 198 bibliographies, online, 126 CNSF (Cornell National Supercomputer Facility), 231-35 databases, online, 127 Colorado Supernet Astronomy archives of software, 128 bibliographies, online, 128, 129 contact information, 198 commercial networks, 180 contact information, 201 databases, online, 128, 129, 130 compressed files, 49-50 supercomputer software, 241 CompuServe sending electronic mail to, 36 B Computational Fluid Dynamics supercomputer software, 231, 241, 252 BARRNet, 11, 177 contact information, 198 BBSs (Bulletin Board Services), 185 bibliographies, online, 119-47 binary files and FTP, 50 computer software databases, online, 132 FTP archives, 132, also see Archie CONCERT Network contact information, 198 Connection Machine Trademarks and Copyrights and parallel architecture, 220, 221 and WAIS, 148 E at NCAR, 236 at NCSA, 240 EARN, 13 at PSC, 251 Earth Kids project, 175 at supercomputer sites, 219 Ecology and Environment consumer affairs databases, online, 125 COSMIC, 132 CRAY Macro and Microtasking, 223 CRAY supercomputers, 219 and parallel architecture, 220 at NCAR, 236 at NCSA, 240 at NERSC, 247 at PSC, 251 at SDSC, 259 CREN (Corporation for Research and Educational Networking), 13 CSNET, 13 CULDAT (Canadian Union List of Machine Readable Data Files), 122 databases, online, 128, 134 simulation software, 134 Economics databases, online, 123, 125 EDUCOM, 16 Electrical Engineering supercomputer software, 241, 252 electronic books, 98-102 LISTSERV discussion group, 102 electronic journals, 96 and K-12 education, 186 list of journals, 197 comprehensive directory, 97 subscribing, 96 electronic libraries, see OPACs electronic mail, 20-39 and K-12 education, 182-83 D basic introduction, 20-25 compared to postal mail, 21-24 DARPA, 7 etiquette, 28-33 databases, online, 119-47 mailbox, 25 and K-12 education, 187 signature file, 29 general interest, 123, 125 software, 24-25 DDN (Data Defense Network), 10 DECnet sending electronic mail to, 36 directory services, 158-69 stylistic conventions, 28-30 technical references, 27 electronic mail gateways, 34-39 online list of, 37 astronomers, 127 published compendia of, 37 table of services and syntaxes, 163 table of examples, 36-37 Disabled Data Link Group, 175 DISNET, 10 Distance Education and K-12 education, 188 databases of information about, 135 DNS (Domain Name System), see Internet, addresses domain, 9 electronic mail servers, 25-27 online list of, 27 sample session, 26 Electronics supercomputer software, 231 Engineering supercomputer software, 231, 242, 252 ENZYME database, 137 ESnet (Energy Sciences Network), 10 sending electronic mail to, 36 Trademarks and Copyrights databases, online, 140 Grants and Contracts F databases of, online, 141 FAQs (Frequently Asked Questions) graphics software for personal computers FTP archive at NCSA, 241 FTP archives of, 77 in USENET newsgroups, 77 supercomputer software, 232, 236, 241, 247, 253, 260 FidoNet description, 179 sending electronic mail to, 36 Gutenberg, Project, 26, 98-100 contact information, 100 file archiving programs, 49 electronic texts by e-mail server, 99 example of how to use, 50-51 electronic texts by FTP, 99 explained, 49 LISTSERV discussion group, 102 getting a comprehensive list, 52 file compression, 49-50 example of how to uncompress, 50-51 USENET discussion groups about, 52 file compression programs getting a comprehensive list, 52 file directories anonymous FTP hosts, 40-41 root directory, 40 flame-war, defined, 80 H HEPNET (High Energy Physics Network), 10 History databases, online, 142 host, 9 I FrEdMail Foundation contact information, 213 Free-Net, 123 FTP (File Transfer Protocol), 39-48 IBM 3090 supercomputer, 219 and parallel architecture, 220 at CNSF, 231 anonymous, 39-46 brief sample session, 41 expanded sample session, 42-46 online list of hosts, 48 short list of FTP hosts, 42 IETF (Internet Engineering Task Force), 16 basic commands, 42 INFO-SOUTH, 125 copying files, 44 Interbit (Internet-BITNET) gateways, 35 online help, 47 Internet technical references, 48 independent memory banks and supercomputers, 219 operation of, 219 addresses, 8-9 FTP file archives, 39-46, also see Archie basic description, 6-18 FTP hosts general references, 13, 14 defined, 39 Internet Protocols technical references, 13, 15 organization in the U.S., 9 G support and training for K-12 educators, 177 gateways, see electronic mail gateways Gene-Server database, 137 Genetics databases, online, 135-40 Internet Society, The, 16 INTEROP, 16 IP address (Internet Protocol address), see Internet, addresses IuBIO software archives, 131, 138 Geography Trademarks and Copyrights J M JANET mailbox, see electronic mail, mailbox sending electronic mail to, 36 JVNCNet, 11 contact information, 198 Maple software archives, 145 Mathematica software archives, 145 MATLAB numeric computation archives, 143 MCI sending electronic mail to, 36 K Mechanics supercomputer software, 232, 242, 253, 260 K-12 education and the Internet, 170-214 conferences, 189 databases of curricular activities, 129 network etiquette, 187 Medieval and Early Modern Data Bank (MEMDB), 142 Merit contact information, 198 online databases suitable for, 125, 129 online interest groups, 194 Meteorology periodicals, 189 databases, online, 123 references, 188 research networks, see USAN sources of funding, 181 supercomputer support, see NCAR K12 Net metropolitan networks, 12 contact information, 213 MFENET (Magnetic Fusion Energy Network), 10 description, 179 MichNet contact information, 198 file archives, 184 Knowbot Information Server (KIS), 162, 163 MIDnet, 11 contact information, 198 sample session, 164-65 MILNET, 10 Molecular Biology L bibliographies, online, 139 databases, online, 135-40 LANL, 12 software archives, 138 Latin American Database (LADB), 126 LiMB (Listing of Molecular Biology Databases), 135 supercomputer software, 252, 259 MRNet, 11 contact information, 199 LISTSERV, 86-93 and K-12 education, 186 list of lists, 191-93 Music lyrics archives, 145 basic commands, 89 example of how to use, 88 N LISTDB, 91 LISTSERV defined, 87 LISTSERVer defined, 87 Literature databases, online, 143 Los Nettos, 11 contact information, 198 National Archives Center for Electronic Records, 122 National Public Telecommunications Network (NPTN), 185 and K-12 education, 180 contact information, 214 National Space Science Data Center, 128 Trademarks and Copyrights NCAR (National Center for Atmospheric Research), 236-39 NCSA (National Center for Supercomputer Applications), 240-46 supercomputer software, 260 NUSIRG how to use, 3-6 Beckman Institute, 242 NWACC (Northwest Academic Computing Consortium, Inc.), iii Renaissance Experimental Laboratory, 242 NYSERNet, 11 NCSANet, 12 contact information, 199 nCUBE at San Diego Supercomputer Center, 259 NEARnet, 11 contact information, 199 NERSC (National Energy Research Supercomputer Center), 247-50 NETillinois O OARnet contact information, 199 OPACs (Online Public Access Catalogs), 102-18 and K-12 education, 183-84 contact information, 199 basic references for using, 104 Netlib mathematical archives, 144 online discussions about, 118 NevadaNet sample session, 105 contact information, 199 Newsday project, 175 NICs (Network Information Centers), 12, 177 suggested search strategies, 105 optimizing compilers and supercomputers, 225-26 NNTP (Network News Transfer Protocol), 71 NOAA, 124 NOCs (Network Operation Centers), 12 NOCs (Network Operations Centers), vii, 177 explained, 225 Oregon Extension Service, 26 Oxford Text Archives, 101 NorthWestNet, iii-iv, 11, 177 acceptable use of, v P annual meetings, iii contact information, 199 described, iii NOC (Network Operations Center), vii-viii diagnostic tools repository, viii domain name services, viii NMS (Network Management Station), vii services offered, iii, 178 PackIt, 51 parallel architectures and supercomputers, 220 parallel processing explained, 223-25 PENpages, 125, 187 personal computers and the Internet NPTN (National Public Telecommunications Network), 123 FTP archives of software, 132 NREN (National Research and Education Network), iii, 9, 17, 177 TCP/IP software, 64 FTP software, 41, 47 structure of, iii TELNET use, 54 to obtain current information, 17 USENET newsreader software, 74 NSF (National Science Foundation) and NREN, iii NSFNET (National Science Foundation Network), vi, 10, 176 backbone sites, 11 NSN (NASA Science Network), 10 Nuclear Engineering Physics Information Network (PINET), 145 PKZIP, 51 Political Science bibliographies, online, 141 databases, online, 123 Population Genetics bibliography, online, 136 Trademarks and Copyrights PREPnet, 11 contact information, 199 Southwest Research Data Display and Analysis System, 129 Project Zero-G, 175 Spacelink, 129, 187 PROSITE database, 139 SPAN (Space Physics Analysis Network), 10 sending electronic mail to, 37 PSC (Pittsburgh Supercomputer Center), 251-58 Biomedical Initiative, 255 SSD (Solid State Disk), 221 High Performance Parallel Interface (HiPPi), 255 statewide networks, 12 and K-12 education, 178 PSCNET, 12 contact information, 199 contact information, 202-12 Statlib software archives, 146 PSI white pages, 162, 163 StuffIt, 51 PSInet subdomain, 9 contact information, 201 supercomputers, 217-62 sending electronic mail to, 36 and NSFNET, 218-19 public data networks, 180 and simulations, 217 database of software, 133 NSF sponsored sites, descriptions, 229-62 R programming strategies, 226-27 uses of, 218 regional Internet networks contact information, 198-200 SURAnet, 11 contact information, 200 RFCs (Requests for Comments), 14 obtaining by FTP, 14 SWISS-PROT database, 140 root directory, see file directories T S tar program (tape archive), 49, 51 SCINET, 10 SDSC (San Diego Supercomputer Center), 25962 TCP/IP brief description, 7 TELNET, 53-65 SDSCnet, 12 basic information needed to use, 53 contact information, 200 brief sampler of TELNET services, 54 SEQANALREF, 139 sample sessions, 55-63 Sesquinet, 11 technical references, 63 contact information, 199 shell archive, 50 trouble-shooting, 63 TENET sig, see electronic mail, signature file SIMBAD, 129 contact information, 200 THEnet, 11 simulation supercomputer software, 232, 254 sending electronic mail to, 37 tn3270, 19, 53 Sinet and OPAC access, 106 sending electronic mail to, 36 smileys, 29 U soc.net-people, 162 Social Sciences, also see Area Studies bibliographies, online, 122 USAN (University Satellite Network), 10 USENET, 71-86 data archives, online, 122 Trademarks and Copyrights and K-12 education, 186, 195-96 wuarchive (Washington University Archives), 132 etiquette, 78 WVNET FTP archives of information about, 80 contact information, 200 FTP archives of past articles, 81 news feed, 71 X newsgroups, defined, 71 regional hierarchies, 73 X.500, 162 sample session, 81-83 USENET address server, 162, 163, 165-66 USENET discussion groups, 168 X.500 directory service, 166 user-id sample session, 167 construction of, 23 defined, 23 Y uuencode, 51 UUNET, 10 sending electronic mail to, 37 V Yale Bright Star Catalog, 130 yellow pages, online, see directory services Z vector hardware ZOO, 51 and supercomputers, 220 vector processing explained, 222-23 VERnet contact information, 200 visualization, scientific and supercomputers, 220, also see supercomputer site descriptions VNET sending electronic mail to, 37 VxWorks software archives, 133 W WAIS (Wide Area Information Server), 147-58 explained, 148 mailing lists about, 157 references, 158 sample session, 149-56 WESTNET, 11 contact information, 200 white pages, online, see directory services WINCS, 10 WiscNet contact information, 200 Trademarks and Copyrights End of the Project Gutenberg EBook of Northwestnet NUSIRG Internet Guide, by Jonathan Kochmer *** END OF THIS PROJECT GUTENBERG EBOOK NORTHWESTNET NUSIRG INTERNET GUIDE *** ***** This file should be named 40-pdf.pdf or 40-pdf.zip ***** This and all associated files of various formats will be found in: http://www.gutenberg.org/4/40/ Updated editions will replace the previous one--the old editions will be renamed. Creating the works from public domain print editions means that no one owns a United States copyright in these works, so the Foundation (and you!) can copy and distribute it in the United States without permission and without paying copyright royalties. Special rules, set forth in the General Terms of Use part of this license, apply to copying and distributing Project Gutenberg-tm electronic works to protect the PROJECT GUTENBERG-tm concept and trademark. Project Gutenberg is a registered trademark, and may not be used if you charge for the eBooks, unless you receive specific permission. If you do not charge anything for copies of this eBook, complying with the rules is very easy. You may use this eBook for nearly any purpose such as creation of derivative works, reports, performances and research. They may be modified and printed and given away--you may do practically ANYTHING with public domain eBooks. Redistribution is subject to the trademark license, especially commercial redistribution. *** START: FULL LICENSE *** THE FULL PROJECT GUTENBERG LICENSE PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK To protect the Project Gutenberg-tm mission of promoting the free distribution of electronic works, by using or distributing this work (or any other work associated in any way with the phrase "Project Gutenberg"), you agree to comply with all the terms of the Full Project Gutenberg-tm License (available with this file or online at http://www.gutenberg.org/license). Section 1. General Terms of Use and Redistributing Project Gutenberg-tm electronic works 1.A. By reading or using any part of this Project Gutenberg-tm electronic work, you indicate that you have read, understand, agree to and accept all the terms of this license and intellectual property (trademark/copyright) agreement. If you do not agree to abide by all the terms of this agreement, you must cease using and return or destroy all copies of Project Gutenberg-tm electronic works in your possession. If you paid a fee for obtaining a copy of or access to a Project Gutenberg-tm electronic work and you do not agree to be bound by the terms of this agreement, you may obtain a refund from the person or entity to whom you paid the fee as set forth in paragraph 1.E.8. 1.B. "Project Gutenberg" is a registered trademark. It may only be used on or associated in any way with an electronic work by people who agree to be bound by the terms of this agreement. There are a few things that you can do with most Project Gutenberg-tm electronic works even without complying with the full terms of this agreement. See paragraph 1.C below. There are a lot of things you can do with Project Gutenberg-tm electronic works if you follow the terms of this agreement and help preserve free future access to Project Gutenberg-tm electronic works. See paragraph 1.E below. 1.C. The Project Gutenberg Literary Archive Foundation ("the Foundation" or PGLAF), owns a compilation copyright in the collection of Project Gutenberg-tm electronic works. Nearly all the individual works in the collection are in the public domain in the United States. If an individual work is in the public domain in the United States and you are located in the United States, we do not claim a right to prevent you from copying, distributing, performing, displaying or creating derivative works based on the work as long as all references to Project Gutenberg are removed. Of course, we hope that you will support the Project Gutenberg-tm mission of promoting free access to electronic works by freely sharing Project Gutenberg-tm works in compliance with the terms of this agreement for keeping the Project Gutenberg-tm name associated with the work. You can easily comply with the terms of this agreement by keeping this work in the same format with its attached full Project Gutenberg-tm License when you share it without charge with others. This particular work is one of the few copyrighted individual works included with the permission of the copyright holder. Information on the copyright owner for this particular work and the terms of use imposed by the copyright holder on this work are set forth at the beginning of this work. 1.D. The copyright laws of the place where you are located also govern what you can do with this work. Copyright laws in most countries are in a constant state of change. If you are outside the United States, check the laws of your country in addition to the terms of this agreement before downloading, copying, displaying, performing, distributing or creating derivative works based on this work or any other Project Gutenberg-tm work. The Foundation makes no representations concerning the copyright status of any work in any country outside the United States. 1.E. Unless you have removed all references to Project Gutenberg: 1.E.1. The following sentence, with active links to, or other immediate access to, the full Project Gutenberg-tm License must appear prominently whenever any copy of a Project Gutenberg-tm work (any work on which the phrase "Project Gutenberg" appears, or with which the phrase "Project Gutenberg" is associated) is accessed, displayed, performed, viewed, copied or distributed: This eBook is for the use of anyone anywhere at no cost and with almost no restrictions whatsoever. You may copy it, give it away or re-use it under the terms of the Project Gutenberg License included with this eBook or online at www.gutenberg.org 1.E.2. If an individual Project Gutenberg-tm electronic work is derived from the public domain (does not contain a notice indicating that it is posted with permission of the copyright holder), the work can be copied and distributed to anyone in the United States without paying any fees or charges. If you are redistributing or providing access to a work with the phrase "Project Gutenberg" associated with or appearing on the work, you must comply either with the requirements of paragraphs 1.E.1 through 1.E.7 or obtain permission for the use of the work and the Project Gutenberg-tm trademark as set forth in paragraphs 1.E.8 or 1.E.9. 1.E.3. If an individual Project Gutenberg-tm electronic work is posted with the permission of the copyright holder, your use and distribution must comply with both paragraphs 1.E.1 through 1.E.7 and any additional terms imposed by the copyright holder. Additional terms will be linked to the Project Gutenberg-tm License for all works posted with the permission of the copyright holder found at the beginning of this work. 1.E.4. Do not unlink or detach or remove the full Project Gutenberg-tm License terms from this work, or any files containing a part of this work or any other work associated with Project Gutenberg-tm. 1.E.5. Do not copy, display, perform, distribute or redistribute this electronic work, or any part of this electronic work, without prominently displaying the sentence set forth in paragraph 1.E.1 with active links or immediate access to the full terms of the Project Gutenberg-tm License. 1.E.6. You may convert to and distribute this work in any binary, compressed, marked up, nonproprietary or proprietary form, including any word processing or hypertext form. However, if you provide access to or distribute copies of a Project Gutenberg-tm work in a format other than "Plain Vanilla ASCII" or other format used in the official version posted on the official Project Gutenberg-tm web site (www.gutenberg.org), you must, at no additional cost, fee or expense to the user, provide a copy, a means of exporting a copy, or a means of obtaining a copy upon request, of the work in its original "Plain Vanilla ASCII" or other form. Any alternate format must include the full Project Gutenberg-tm License as specified in paragraph 1.E.1. 1.E.7. Do not charge a fee for access to, viewing, displaying, performing, copying or distributing any Project Gutenberg-tm works unless you comply with paragraph 1.E.8 or 1.E.9. 1.E.8. You may charge a reasonable fee for copies of or providing access to or distributing Project Gutenberg-tm electronic works provided that - You pay a royalty fee of 20of the gross profits you derive from the use of Project Gutenberg-tm works calculated using the method you already use to calculate your applicable taxes. The fee is owed to the owner of the Project Gutenberg-tm trademark, but he has agreed to donate royalties under this paragraph to the Project Gutenberg Literary Archive Foundation. Royalty payments must be paid within 60 days following each date on which you prepare (or are legally required to prepare) your periodic tax returns. Royalty payments should be clearly marked as such and sent to the Project Gutenberg Literary Archive Foundation at the address specified in Section 4, "Information about donations to the Project Gutenberg Literary Archive Foundation." - You provide a full refund of any money paid by a user who notifies you in writing (or by e-mail) within 30 days of receipt that s/he does not agree to the terms of the full Project Gutenberg-tm License. You must require such a user to return or destroy all copies of the works possessed in a physical medium and discontinue all use of and all access to other copies of Project Gutenberg-tm works. - You provide, in accordance with paragraph 1.F.3, a full refund of any money paid for a work or a replacement copy, if a defect in the electronic work is discovered and reported to you within 90 days of receipt of the work. - You comply with all other terms of this agreement for free distribution of Project Gutenberg-tm works. 1.E.9. If you wish to charge a fee or distribute a Project Gutenberg-tm electronic work or group of works on different terms than are set forth in this agreement, you must obtain permission in writing from both the Project Gutenberg Literary Archive Foundation and Michael Hart, the owner of the Project Gutenberg-tm trademark. Foundation as set forth in Section 3 below. Contact the 1.F. 1.F.1. Project Gutenberg volunteers and employees expend considerable effort to identify, do copyright research on, transcribe and proofread public domain works in creating the Project Gutenberg-tm collection. Despite these efforts, Project Gutenberg-tm electronic works, and the medium on which they may be stored, may contain "Defects," such as, but not limited to, incomplete, inaccurate or corrupt data, transcription errors, a copyright or other intellectual property infringement, a defective or damaged disk or other medium, a computer virus, or computer codes that damage or cannot be read by your equipment. 1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for the "Right of Replacement or Refund" described in paragraph 1.F.3, the Project Gutenberg Literary Archive Foundation, the owner of the Project Gutenberg-tm trademark, and any other party distributing a Project Gutenberg-tm electronic work under this agreement, disclaim all liability to you for damages, costs and expenses, including legal fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE. 1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you discover a defect in this electronic work within 90 days of receiving it, you can receive a refund of the money (if any) you paid for it by sending a written explanation to the person you received the work from. If you received the work on a physical medium, you must return the medium with your written explanation. The person or entity that provided you with the defective work may elect to provide a replacement copy in lieu of a refund. If you received the work electronically, the person or entity providing it to you may choose to give you a second opportunity to receive the work electronically in lieu of a refund. If the second copy is also defective, you may demand a refund in writing without further opportunities to fix the problem. 1.F.4. Except for the limited right of replacement or refund set forth in paragraph 1.F.3, this work is provided to you 'AS-IS,' WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTIBILITY OR FITNESS FOR ANY PURPOSE. 1.F.5. Some states do not allow disclaimers of certain implied warranties or the exclusion or limitation of certain types of damages. If any disclaimer or limitation set forth in this agreement violates the law of the state applicable to this agreement, the agreement shall be interpreted to make the maximum disclaimer or limitation permitted by the applicable state law. The invalidity or unenforceability of any provision of this agreement shall not void the remaining provisions. 1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation, the trademark owner, any agent or employee of the Foundation, anyone providing copies of Project Gutenberg-tm electronic works in accordance with this agreement, and any volunteers associated with the production, promotion and distribution of Project Gutenberg-tm electronic works, harmless from all liability, costs and expenses, including legal fees, that arise directly or indirectly from any of the following which you do or cause to occur: (a) distribution of this or any Project Gutenberg-tm work, (b) alteration, modification, or additions or deletions to any Project Gutenberg-tm work, and (c) any Defect you cause. Section 2. Information about the Mission of Project Gutenberg-tm Project Gutenberg-tm is synonymous with the free distribution of electronic works in formats readable by the widest variety of computers including obsolete, old, middle-aged and new computers. It exists because of the efforts of hundreds of volunteers and donations from people in all walks of life. Volunteers and financial support to provide volunteers with the assistance they need are critical to reaching Project Gutenberg-tm's goals and ensuring that the Project Gutenberg-tm collection will remain freely available for generations to come. In 2001, the Project Gutenberg Literary Archive Foundation was created to provide a secure and permanent future for Project Gutenberg-tm and future generations. To learn more about the Project Gutenberg Literary Archive Foundation and how your efforts and donations can help, see Sections 3 and 4 and the Foundation web page at http://www.pglaf.org. Section 3. Foundation Information about the Project Gutenberg Literary Archive The Project Gutenberg Literary Archive Foundation is a non profit 501(c)(3) educational corporation organized under the laws of the state of Mississippi and granted tax exempt status by the Internal Revenue Service. The Foundation's EIN or federal tax identification number is 64-6221541. Its 501(c)(3) letter is posted at http://pglaf.org/fundraising. Contributions to the Project Gutenberg Literary Archive Foundation are tax deductible to the full extent permitted by U.S. federal laws and your state's laws. The Foundation's principal office is located at 4557 Melan Dr. S. Fairbanks, AK, 99712., but its volunteers and employees are scattered throughout numerous locations. Its business office is located at 809 North 1500 West, Salt Lake City, UT 84116, (801) 596-1887, email [email protected]. Email contact links and up to date contact information can be found at the Foundation's web site and official page at http://pglaf.org For additional contact information: Dr. Gregory B. Newby Chief Executive and Director [email protected] Section 4. Information about Donations to the Project Gutenberg Literary Archive Foundation Project Gutenberg-tm depends upon and cannot survive without wide spread public support and donations to carry out its mission of increasing the number of public domain and licensed works that can be freely distributed in machine readable form accessible by the widest array of equipment including outdated equipment. Many small donations ($1 to $5,000) are particularly important to maintaining tax exempt status with the IRS. The Foundation is committed to complying with the laws regulating charities and charitable donations in all 50 states of the United States. Compliance requirements are not uniform and it takes a considerable effort, much paperwork and many fees to meet and keep up with these requirements. We do not solicit donations in locations where we have not received written confirmation of compliance. To SEND DONATIONS or determine the status of compliance for any particular state visit http://pglaf.org While we cannot and do not solicit contributions from states where we have not met the solicitation requirements, we know of no prohibition against accepting unsolicited donations from donors in such states who approach us with offers to donate. International donations are gratefully accepted, but we cannot make any statements concerning tax treatment of donations received from outside the United States. U.S. laws alone swamp our small staff. Please check the Project Gutenberg Web pages for current donation methods and addresses. Donations are accepted in a number of other ways including checks, online payments and credit card donations. To donate, please visit: http://pglaf.org/donate Section 5. works. General Information About Project Gutenberg-tm electronic Professor Michael S. Hart is the originator of the Project Gutenberg-tm concept of a library of electronic works that could be freely shared with anyone. For thirty years, he produced and distributed Project Gutenberg-tm eBooks with only a loose network of volunteer support. Project Gutenberg-tm eBooks are often created from several printed editions, all of which are confirmed as Public Domain in the U.S. unless a copyright notice is included. Thus, we do not necessarily keep eBooks in compliance with any particular paper edition. Each eBook is in a subdirectory of the same number as the eBook's eBook number, often in several formats including plain vanilla ASCII, compressed (zipped), HTML and others. Corrected EDITIONS of our eBooks replace the old file and take over the old filename and etext number. The replaced older file is renamed. VERSIONS based on separate sources are treated as new eBooks receiving new filenames and etext numbers. Most people start at our Web site which has the main PG search facility: http://www.gutenberg.org This Web site includes information about Project Gutenberg-tm, including how to make donations to the Project Gutenberg Literary Archive Foundation, how to help produce our new eBooks, and how to subscribe to our email newsletter to hear about new eBooks. EBooks posted prior to November 2003, with eBook numbers BELOW #10000, are filed in directories based on their release date. If you want to download any of these eBooks directly, rather than using the regular search system you may utilize the following addresses and just download by the etext year. http://www.ibiblio.org/gutenberg/etext06 (Or /etext 05, 04, 03, 02, 01, 00, 99, 98, 97, 96, 95, 94, 93, 92, 92, 91 or 90) EBooks posted since November 2003, with etext numbers OVER #10000, are filed in a different way. The year of a release date is no longer part of the directory path. The path is based on the etext number (which is identical to the filename). The path to the file is made up of single digits corresponding to all but the last digit in the filename. For example an eBook of filename 10234 would be found at: http://www.gutenberg.org/1/0/2/3/10234 or filename 24689 would be found at: http://www.gutenberg.org/2/4/6/8/24689 An alternative method of locating eBooks: http://www.gutenberg.org/GUTINDEX.ALL *** END: FULL LICENSE ***
© Copyright 2026 Paperzz